Доступ предоставлен для: Guest
Портал Begell Электронная Бибилиотека e-Книги Журналы Справочники и Сборники статей Коллекции
Telecommunications and Radio Engineering
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN Печать: 0040-2508
ISSN Онлайн: 1943-6009

Выпуски:
Том 79, 2020 Том 78, 2019 Том 77, 2018 Том 76, 2017 Том 75, 2016 Том 74, 2015 Том 73, 2014 Том 72, 2013 Том 71, 2012 Том 70, 2011 Том 69, 2010 Том 68, 2009 Том 67, 2008 Том 66, 2007 Том 65, 2006 Том 64, 2005 Том 63, 2005 Том 62, 2004 Том 61, 2004 Том 60, 2003 Том 59, 2003 Том 58, 2002 Том 57, 2002 Том 56, 2001 Том 55, 2001 Том 54, 2000 Том 53, 1999 Том 52, 1998 Том 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v78.i11.40
pages 957-971

ADVANCE REMOTE USER AUTHENTICATION SCHEME USING SMART CARD

S. Kumar
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
V. Singh
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
V. Sharma
Department of Computer Science & Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP, India
Vijay Singh

Краткое описание

In 2016, Kaul and Awasthi proposed security enhancement of an improved remote user authentication scheme with key agreement and they proclaimed that their scheme ensures secure communication on an insecure channel and they also proposed that their scheme is secure against active and passive attacks. But in this paper, we demonstrate that their proposed scheme is completely insecure against malicious user attack, insider attack and also that an arbitrary user can easily reregister him, if he has certain parameters of Kaul et al. proposed scheme. Thus collapses the entire security of the system as well as user's data and author claims are proven to be incorrect.
Hence to cure the identified security flaws and to ensure the communication through an insecure channel, we proposed a better secure and efficient authentication protocol mechanism and also we have added some necessary phase required in authentication.

ЛИТЕРАТУРА

  1. Li, C.T. and Hwang, M.S., (2010) An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and computer applications, 33(1), pp. 1-5.

  2. Liao, I.E., Lee, C.C., and Hwang, M.S., (2005) Security enhancement for a dynamic ID-based remote user authentication scheme, Next Generation Web Services Practices, NWeSP. International Conference, pp. 1-4.

  3. Yoon, E.J., Ryu, E.K., and Yoo, K.Y., (2004) Further improvement of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, 50(2), pp. 612-614.

  4. Wen, F. and Li, X., (2012) An improved dynamic ID-based remote user authentication with key agreement scheme, Computers & Electrical Engineering, 38(2), pp. 381-387.

  5. Wang, Y.Y., Liu, J.Y., Xiao, F.X., and Dan, J., (2009) A more efficient and secure dynamic ID-based remote user authentication scheme, Computer communications, 32(4), pp. 583-585.

  6. Lamport, L., (1981) Password authentication with insecure communication, Communications of the ACM, 24(11), pp. 770-772.

  7. Chien, H.Y. and Chen, C.H., (2005) A remote authentication scheme preserving user anonymity, Advanced Information Networking and Applications, AINA, 19th International Conference, 2, pp. 245-248.

  8. Das, M.L., Saxena, A., and Gulati, V.P., (2004) A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, 50(2), pp. 629-631.

  9. He, D. and Wu, S., (2013) Security flaws in a smart card based authentication scheme for multi-server environment, Wireless Personal Communications, 70(1), pp. 323-329.

  10. Wang, B. and Ma, M., (2013) A smart card based efficient and secured multi-server authentication scheme, Wireless Personal Communications, 68(2), pp. 361-378.

  11. Wang, D., Wang, N., Wang, P., and Qing, S., (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity, Information Sciences, 321, pp. 162-178.

  12. Liu, S., Hu, S., Weng, J., Zhu, S., and Chen, Z., (2016) A novel asymmetric three-party based authentication scheme in wearable devices environment, Journal of Network and Computer Applications, 60, pp. 144-154.

  13. Chang, Y.F., Tai, W.L., and Chang, H.C., (2014) Untraceable dynamic identity based remote user authentication scheme with verifiable password update, International Journal of Communication Systems, 27(11), pp. 3430-3440.

  14. Mohammad ali, A., Haghighi, M.S., Tadayon, M.H., and Mohammadi-Nodooshan, A., (2018) A novel identity-based key establishment method for advanced metering infrastructure in smart grid, IEEE Transactions on Smart Grid, 9(4), pp. 2834-2842.

  15. Kaul, S.D. and Awasthi, A.K., (2016) Security enhancement of an improved remote user authentication scheme with key agreement, Wireless Personal Communications, 89(2), pp. 621-637.


Articles with similar content:

Detection and Avoidance of Input Validation Attacks in Web Application Using Deterministic Push Down Automata
Journal of Automation and Information Sciences, Vol.51, 2019, issue 9
S. Senthilkumar, V. Nithya
Vaccine Information Statements. Revolutionary but Neglected Educational Advances in Healthcare in the United States
Journal of Long-Term Effects of Medical Implants, Vol.15, 2005, issue 1
William B. Long III, Richard Edlich, Jocelynn H. Gebhart, Kathryne L. Winters, L. D. Britt, Marcus L. Martin, Marni L. Foley
Evidence-Informed Management of Chronic Low Back Pain with Lumbar Strengthening and McKenzie Exercise
Critical Reviews™ in Physical and Rehabilitation Medicine, Vol.20, 2008, issue 4
Vert Mooney, Thomas E. Dreisinger
P2X3-Receptor Desensitization as an Alternative Mechanism of Analgesia
International Journal of Physiology and Pathophysiology, Vol.4, 2013, issue 4
Oleg O. Krishtal, Natalia S. Petrenko
RESEARCH ON CONTROL TECHNOLOGY OF GRID CONNECTED INVERTER BASED ON NON-IDEAL GRID
Telecommunications and Radio Engineering, Vol.79, 2020, issue 15
J. Zhang, B. Liu, Ch. Zhu