Suscripción a Biblioteca: Guest
Portal Digitalde Biblioteca Digital eLibros Revistas Referencias y Libros de Ponencias Colecciones
Telecommunications and Radio Engineering
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN Imprimir: 0040-2508
ISSN En Línea: 1943-6009

Volumes:
Volumen 79, 2020 Volumen 78, 2019 Volumen 77, 2018 Volumen 76, 2017 Volumen 75, 2016 Volumen 74, 2015 Volumen 73, 2014 Volumen 72, 2013 Volumen 71, 2012 Volumen 70, 2011 Volumen 69, 2010 Volumen 68, 2009 Volumen 67, 2008 Volumen 66, 2007 Volumen 65, 2006 Volumen 64, 2005 Volumen 63, 2005 Volumen 62, 2004 Volumen 61, 2004 Volumen 60, 2003 Volumen 59, 2003 Volumen 58, 2002 Volumen 57, 2002 Volumen 56, 2001 Volumen 55, 2001 Volumen 54, 2000 Volumen 53, 1999 Volumen 52, 1998 Volumen 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v78.i11.40
pages 957-971

ADVANCE REMOTE USER AUTHENTICATION SCHEME USING SMART CARD

S. Kumar
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
V. Singh
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
V. Sharma
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
Vijay Singh

SINOPSIS

In 2016, Kaul and Awasthi proposed security enhancement of an improved remote user authentication scheme with key agreement and they proclaimed that their scheme ensures secure communication on an insecure channel and they also proposed that their scheme is secure against active and passive attacks. But in this paper, we demonstrate that their proposed scheme is completely insecure against malicious user attack, insider attack and also that an arbitrary user can easily reregister him, if he has certain parameters of Kaul et al. proposed scheme. Thus collapses the entire security of the system as well as user's data and author claims are proven to be incorrect.
Hence to cure the identified security flaws and to ensure the communication through an insecure channel, we proposed a better secure and efficient authentication protocol mechanism and also we have added some necessary phase required in authentication.

REFERENCIAS

  1. Li, C.T. and Hwang, M.S., (2010) An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and computer applications, 33(1), pp. 1-5.

  2. Liao, I.E., Lee, C.C., and Hwang, M.S., (2005) Security enhancement for a dynamic ID-based remote user authentication scheme, Next Generation Web Services Practices, NWeSP. International Conference, pp. 1-4.

  3. Yoon, E.J., Ryu, E.K., and Yoo, K.Y., (2004) Further improvement of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, 50(2), pp. 612-614.

  4. Wen, F. and Li, X., (2012) An improved dynamic ID-based remote user authentication with key agreement scheme, Computers & Electrical Engineering, 38(2), pp. 381-387.

  5. Wang, Y.Y., Liu, J.Y., Xiao, F.X., and Dan, J., (2009) A more efficient and secure dynamic ID-based remote user authentication scheme, Computer communications, 32(4), pp. 583-585.

  6. Lamport, L., (1981) Password authentication with insecure communication, Communications of the ACM, 24(11), pp. 770-772.

  7. Chien, H.Y. and Chen, C.H., (2005) A remote authentication scheme preserving user anonymity, Advanced Information Networking and Applications, AINA, 19th International Conference, 2, pp. 245-248.

  8. Das, M.L., Saxena, A., and Gulati, V.P., (2004) A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, 50(2), pp. 629-631.

  9. He, D. and Wu, S., (2013) Security flaws in a smart card based authentication scheme for multi-server environment, Wireless Personal Communications, 70(1), pp. 323-329.

  10. Wang, B. and Ma, M., (2013) A smart card based efficient and secured multi-server authentication scheme, Wireless Personal Communications, 68(2), pp. 361-378.

  11. Wang, D., Wang, N., Wang, P., and Qing, S., (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity, Information Sciences, 321, pp. 162-178.

  12. Liu, S., Hu, S., Weng, J., Zhu, S., and Chen, Z., (2016) A novel asymmetric three-party based authentication scheme in wearable devices environment, Journal of Network and Computer Applications, 60, pp. 144-154.

  13. Chang, Y.F., Tai, W.L., and Chang, H.C., (2014) Untraceable dynamic identity based remote user authentication scheme with verifiable password update, International Journal of Communication Systems, 27(11), pp. 3430-3440.

  14. Mohammad ali, A., Haghighi, M.S., Tadayon, M.H., and Mohammadi-Nodooshan, A., (2018) A novel identity-based key establishment method for advanced metering infrastructure in smart grid, IEEE Transactions on Smart Grid, 9(4), pp. 2834-2842.

  15. Kaul, S.D. and Awasthi, A.K., (2016) Security enhancement of an improved remote user authentication scheme with key agreement, Wireless Personal Communications, 89(2), pp. 621-637.


Articles with similar content:

Method of Developing a Web-Application Firewall
Journal of Automation and Information Sciences, Vol.51, 2019, issue 6
Rustam Kh. Khamdamov , Komil F. Kerimov , Jalol Oybek ugli Ibrahimov
The Push-Out Strategy with a Virtual Threshold to Access the Integral Network Node Buffer
Journal of Automation and Information Sciences, Vol.36, 2004, issue 7
Mekhrivan Isa kyzy Fattakhova, Agasi Zarbali ogly Melikov, Leonid A. Ponomarenko
Methods of Blocking Vulnerabilities of XSS Type Based on the Service Oriented Architecture
Journal of Automation and Information Sciences, Vol.51, 2019, issue 12
Rustam Kh. Khamdamov , Komil F. Kerimov
HIGH DATA RATE OF A NOVEL MODULATION SCHEME BASED ON ORTHOGONAL CHAOTIC SIGNALS
Telecommunications and Radio Engineering, Vol.75, 2016, issue 18
Abbas Salman Hameed
A Review on Functional Electrical Stimulation of Bladder and Bowel in Spinal Cord Injury
Journal of Long-Term Effects of Medical Implants, Vol.27, 2017, issue 2-4
Tyler C. Wind, Elizabeth V. Jones, Richard Edlich, William D. Steers