Comparative Analysis of Smart Card Authentication Schemes
نویسنده
چکیده
Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In these schemes, server maintains a verification table which is vulnerable to a variety of attacks. To withstand the possible attacks for verification table, smart card based authentication scheme has been proposed as an alternative solution. Smart card is a small, tamper-resistant device providing users with a convenient storage and processing capability, it is widely used for a range of applications such as remote user login, online banking, ID verification, access control and e-commerce etc. This article gives comparative analysis of major smart card authentication schemes for single server as well as multi-server environment.
منابع مشابه
Analysis of Password based Multi-server Authentication Schemes
As of today, numerous researchers have explored the issue of secure and efficient smart card based authentication scheme for these variety of application areas. This article explores the background research on the single server smart card authentication schemes as well as multi-server smart card authentication schemes and its associated research gaps. This article gives comparative analysis of ...
متن کاملRemote User Authentication Schemes: A Review
To secure the resources or information from illegitimate users various kinds of authentication schemes have been designed and developed. Some of these schemes are vulnerable to a variety of attacks. In last decade authentication schemes based on smart card has been proposed to withstand the possible attacks on verification table. Smart card provides a convenient storage and processing capabilit...
متن کاملSecurity Vulnerabilities of User Authentication Scheme Using Smart Card
With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerabl...
متن کاملA Novel Smart Card Authentication Scheme using Image Watermarking
One of the primary issues of information technology and communication is the security of information from unwanted frauds. For every transaction over insecure channel authentication is required. Since the rise of the Internet smart card authentication schemes have been widely used to avoid the problems related to traditional password based authentication schemes. However, most of the smart card...
متن کاملA Study On ID-based Authentication Schemes for Telecare Medical Information System
The smart card based authentication schemes are designed and developed to ensure secure and authorized communication between remote user and the server. In recent times, many smart card based authentication schemes for the telecare medical information systems (TMIS) have been presented. In this article, we briefly discuss some of the recently published smart card based authentication schemes fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014