An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol
نویسنده
چکیده
Password is the most commonly used authentication technique in smart card based authentication protocols. During communication, the static identity based authentication protocols leaks out the user’s authentication messages corresponding to static identity to the attacker. Therefore, the attacker can trace and identify the different requests belonging to the same user. On the other hand, the dynamic identity based authentication protocols provide multi-factor authentication based on the identity, password, smart card and hence more suitable to e-commerce applications. In 2008, Liu et al. proposed a nonce based mutual authentication scheme using smart cards. In 2009, Sun et al. demonstrated man-inthe-middle attack on Liu et al.’s scheme. However, we found that Liu et al.’s scheme is also vulnerable to stolen smart card attack. This paper presents a new dynamic identity based authentication scheme that uses the nonce and timestamp at the same time to resolve the aforementioned problems, while keeping the merits of Liu et al.’s scheme. The aim of this paper is to provide a dynamic identity based secure and computational efficient authentication protocol with user’s anonymity using smart cards. It protects the user’s identity in insecure communication channel and hence can be applied directly to e-economic applications. Security analysis proved that the proposed protocol is secure and practical.
منابع مشابه
An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic Identity
To keep the pace with the development of internet technology, remote user authentication techniques become more and more important to protect user’s privacy. Recently, Kumari, et al., presented an improved remote user authentication scheme with key agreement based on dynamic-identity using smart card. This scheme allows legal users to change the password at his will without the need to connect ...
متن کاملSecurity Weaknesses of Dynamic ID-based Remote User Authentication Protocol
Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.’s protocol is not secure to randoml...
متن کاملAn Improved Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement
Remote user authentication is a mechanism, in which the remote server verifies the legitimacy of a user over an insecure communication. Password authentication based on smart cards is one of the simplest and most efficient authentication methods and is a commonly deployed to authenticate the legitimacy of remote users. Based on cryptographic techniques, several password authentication schemes h...
متن کاملAn improved remote user authentication scheme with key agreement
Recently, Kumari et al. pointed out that Chang et al.’s scheme “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” not only has several drawbacks, but also does not provide any session key agreement. Hence, they proposed an improved remote user authentication Scheme with key agreement on Chang et al.’s Scheme. After cryptanalysis, they confirm ...
متن کاملA Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems
Abstract—Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote server has been used. These remote schemes resis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 14 شماره
صفحات -
تاریخ انتشار 2012