A strong user authentication scheme with smart cards for wireless communications

被引:148
|
作者
He, Daojing [1 ]
Ma, Maode [2 ]
Zhang, Yan [3 ,4 ]
Chen, Chun [1 ]
Bu, Jiajun [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou, Zhejiang, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Simula Res Lab, Oslo, Norway
[4] Univ Oslo, N-0316 Oslo, Norway
关键词
Authentication; Smart card; Security; Anonymity; Wireless networks; ANONYMITY; SECURITY; EFFICIENT;
D O I
10.1016/j.comcom.2010.02.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Seamless roaming over wireless network is highly desirable to mobile users, and security such as authentication of mobile users is challenging. Recently, due to tamper-resistance and convenience in managing a password file, some smart card based secure authentication schemes have been proposed. This paper shows some security weaknesses in those schemes. As the main contribution of this paper, a secure and light-weight authentication scheme with user anonymity is presented. It is simple to implement for mobile user since it only performs a symmetric encryption/decryption operation. Having this feature, it is more suitable for the low-power and resource-limited mobile devices. In addition, it requires four message exchanges between mobile user, foreign agent and home agent. Thus, this protocol enjoys both computation and communication efficiency as compared to the well-known authentication schemes. As a special case, we consider the authentication protocol when a user is located in his/her home network. Also, the session key will be used only once between the mobile user and the visited network. Besides, security analysis demonstrates that our scheme enjoys important security attributes such as preventing the various kinds of attacks, single registration, user anonymity, no password/verifier table, and high efficiency in password authentication, etc. Moreover, one of the new features in our proposal is: it is secure in the case that the information stored in the smart card is disclosed but the user password of the smart card owner is unknown to the attacker. To the best of our knowledge, until now no user authentication scheme for wireless communications has been proposed to prevent from smart card breach. Finally, performance analysis shows that compared with known smart card based authentication protocols, our proposed scheme is more simple, secure and efficient. Crown Copyright (C) 2010 Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:367 / 374
页数:8
相关论文
共 50 条
  • [21] Cryptanalysis of a remote user authentication scheme using smart cards
    Chan, CK
    Cheng, LM
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) : 992 - 993
  • [22] A modified remote user authentication scheme using smart cards
    Shen, JJ
    Lin, CW
    Hwang, MS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (02) : 414 - 416
  • [23] Cryptanalysis of a remote user authentication scheme using smart cards
    Huang Kai
    Ou Qingyu
    Wu Xiaoping
    Song Yexin
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493
  • [24] Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Kang, Miyoung
    Rhee, Hyun Sook
    Choi, Jin-Young
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 860 - 864
  • [25] CRYPTANALYSIS OF AN EFFICIENT REMOTE USER AUTHENTICATION SCHEME WITH SMART CARDS
    Yeh, Kuo-Hui
    Lo, Nai Wei
    Winata, Enrico
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2595 - 2608
  • [26] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards'
    Khan, Muhammad Khurram
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105
  • [27] Robust smart-cards-based user authentication scheme with user anonymity
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 236 - 248
  • [28] A user friendly authentication scheme with anonymity for wireless communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Ha, Keum-Sook
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (03) : 356 - 364
  • [29] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476
  • [30] An Enhanced and Secure Biometric Based User Authentication Scheme in Wireless Sensor Networks Using Smart Cards
    Banerjee, Subhasish
    Chunka, Chukhu
    Sen, Srijon
    Goswami, Rajat Subhra
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (01) : 243 - 270