图书馆订阅: Guest
Begell Digital Portal Begell 数字图书馆 电子图书 期刊 参考文献及会议录 研究收集
电信和无线电工程
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN 打印: 0040-2508
ISSN 在线: 1943-6009

卷:
卷 79, 2020 卷 78, 2019 卷 77, 2018 卷 76, 2017 卷 75, 2016 卷 74, 2015 卷 73, 2014 卷 72, 2013 卷 71, 2012 卷 70, 2011 卷 69, 2010 卷 68, 2009 卷 67, 2008 卷 66, 2007 卷 65, 2006 卷 64, 2005 卷 63, 2005 卷 62, 2004 卷 61, 2004 卷 60, 2003 卷 59, 2003 卷 58, 2002 卷 57, 2002 卷 56, 2001 卷 55, 2001 卷 54, 2000 卷 53, 1999 卷 52, 1998 卷 51, 1997

电信和无线电工程

DOI: 10.1615/TelecomRadEng.v78.i11.40
pages 957-971

ADVANCE REMOTE USER AUTHENTICATION SCHEME USING SMART CARD

S. Kumar
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
V. Singh
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
V. Sharma
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
Vijay Singh

ABSTRACT

In 2016, Kaul and Awasthi proposed security enhancement of an improved remote user authentication scheme with key agreement and they proclaimed that their scheme ensures secure communication on an insecure channel and they also proposed that their scheme is secure against active and passive attacks. But in this paper, we demonstrate that their proposed scheme is completely insecure against malicious user attack, insider attack and also that an arbitrary user can easily reregister him, if he has certain parameters of Kaul et al. proposed scheme. Thus collapses the entire security of the system as well as user's data and author claims are proven to be incorrect.
Hence to cure the identified security flaws and to ensure the communication through an insecure channel, we proposed a better secure and efficient authentication protocol mechanism and also we have added some necessary phase required in authentication.

REFERENCES

  1. Li, C.T. and Hwang, M.S., (2010) An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and computer applications, 33(1), pp. 1-5.

  2. Liao, I.E., Lee, C.C., and Hwang, M.S., (2005) Security enhancement for a dynamic ID-based remote user authentication scheme, Next Generation Web Services Practices, NWeSP. International Conference, pp. 1-4.

  3. Yoon, E.J., Ryu, E.K., and Yoo, K.Y., (2004) Further improvement of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, 50(2), pp. 612-614.

  4. Wen, F. and Li, X., (2012) An improved dynamic ID-based remote user authentication with key agreement scheme, Computers & Electrical Engineering, 38(2), pp. 381-387.

  5. Wang, Y.Y., Liu, J.Y., Xiao, F.X., and Dan, J., (2009) A more efficient and secure dynamic ID-based remote user authentication scheme, Computer communications, 32(4), pp. 583-585.

  6. Lamport, L., (1981) Password authentication with insecure communication, Communications of the ACM, 24(11), pp. 770-772.

  7. Chien, H.Y. and Chen, C.H., (2005) A remote authentication scheme preserving user anonymity, Advanced Information Networking and Applications, AINA, 19th International Conference, 2, pp. 245-248.

  8. Das, M.L., Saxena, A., and Gulati, V.P., (2004) A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, 50(2), pp. 629-631.

  9. He, D. and Wu, S., (2013) Security flaws in a smart card based authentication scheme for multi-server environment, Wireless Personal Communications, 70(1), pp. 323-329.

  10. Wang, B. and Ma, M., (2013) A smart card based efficient and secured multi-server authentication scheme, Wireless Personal Communications, 68(2), pp. 361-378.

  11. Wang, D., Wang, N., Wang, P., and Qing, S., (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity, Information Sciences, 321, pp. 162-178.

  12. Liu, S., Hu, S., Weng, J., Zhu, S., and Chen, Z., (2016) A novel asymmetric three-party based authentication scheme in wearable devices environment, Journal of Network and Computer Applications, 60, pp. 144-154.

  13. Chang, Y.F., Tai, W.L., and Chang, H.C., (2014) Untraceable dynamic identity based remote user authentication scheme with verifiable password update, International Journal of Communication Systems, 27(11), pp. 3430-3440.

  14. Mohammad ali, A., Haghighi, M.S., Tadayon, M.H., and Mohammadi-Nodooshan, A., (2018) A novel identity-based key establishment method for advanced metering infrastructure in smart grid, IEEE Transactions on Smart Grid, 9(4), pp. 2834-2842.

  15. Kaul, S.D. and Awasthi, A.K., (2016) Security enhancement of an improved remote user authentication scheme with key agreement, Wireless Personal Communications, 89(2), pp. 621-637.


Articles with similar content:

Detection and Avoidance of Input Validation Attacks in Web Application Using Deterministic Push Down Automata
Journal of Automation and Information Sciences, Vol.51, 2019, issue 9
S. Senthilkumar, V. Nithya
Vaccine Information Statements. Revolutionary but Neglected Educational Advances in Healthcare in the United States
Journal of Long-Term Effects of Medical Implants, Vol.15, 2005, issue 1
William B. Long III, Richard Edlich, Jocelynn H. Gebhart, Kathryne L. Winters, L. D. Britt, Marcus L. Martin, Marni L. Foley
Evidence-Informed Management of Chronic Low Back Pain with Lumbar Strengthening and McKenzie Exercise
Critical Reviews™ in Physical and Rehabilitation Medicine, Vol.20, 2008, issue 4
Vert Mooney, Thomas E. Dreisinger
P2X3-Receptor Desensitization as an Alternative Mechanism of Analgesia
International Journal of Physiology and Pathophysiology, Vol.4, 2013, issue 4
Oleg O. Krishtal, Natalia S. Petrenko
RESEARCH ON CONTROL TECHNOLOGY OF GRID CONNECTED INVERTER BASED ON NON-IDEAL GRID
Telecommunications and Radio Engineering, Vol.79, 2020, issue 15
J. Zhang, B. Liu, Ch. Zhu