An Enhanced Verifier-Free Password Authentication Scheme for Resource-Limited Environments

被引:0
|
作者
Ku, Wei-Chi [1 ]
Chung, Hao-Rung [2 ]
Tsaur, Maw-Jinn [3 ]
Wang, Szu-Yao [1 ]
机构
[1] Natl Taichung Univ, Dept Comp & Informat Sci, Taichung, Taiwan
[2] Fu Jen Catholic Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[3] Fu Jen Catholic Univ, Grad Inst Appl Sci & Engn, Taipei, Taiwan
关键词
authentication; mulitmedia; password; reparability; verification table;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To realize secure access to multimedia anywhere, anytime, and with any devices,, we need efficient authentication mechanisms suitable far resource-limited environments. Password authentication is regarded as one of the most widely used authentication mechanisms for its convenience, easy implementation, and user-friendliness. Up to now, many verifier-free password authentication schemes that can resist stolen-verifier attacks have been proposed, and each has its pros and cons. Recently, Wang et al. showed that two new verifier-free password authentication schemes are vulnerable to an off-line password guessing attack, a forgery attack, and a denial-of-service attack, and then proposed an improved scheme for the real application in resource-limited environments. Unfortunately, we rind that Wang (et al.'s scheme is still vulnerable to several attacks. Herein, we propose an enhanced verifier-free password authentication scheme for resource-limited environments with better security strength.
引用
收藏
页码:1211 / +
页数:2
相关论文
共 50 条
  • [1] An enhanced verifier-free remote user password authentication scheme
    Ku, Wei-Chi
    Hwang, Chun-Hao
    Chung, Hao-Rung
    [J]. ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 406 - +
  • [2] Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    Chung, Hao-Rung
    Ku, Wei-Chi
    Tsaur, Maw-Jinn
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 863 - 868
  • [4] A novel DNA based password authentication system for global roaming in resource-limited mobile environments
    Madhusudhan, R.
    Shashidhara, R.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (3-4) : 2185 - 2212
  • [5] Biosurveillance in resource-limited environments
    Taitt, Chris
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2017, 254
  • [6] Breeding strategies for resource-limited environments
    Beilharz, RG
    [J]. ASIAN-AUSTRALASIAN JOURNAL OF ANIMAL SCIENCES, 2000, 13 : 271 - 274
  • [7] Security Architecture for Resource-Limited Environments
    Nair, S.
    Abraham, S.
    Al Ibrahim, O.
    [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 412 - 417
  • [8] Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things
    Xing, Zeng
    Zhao, Bo
    Xu, Bo
    Ren, Guangliang
    Liu, Zhiqiang
    [J]. KSII Transactions on Internet and Information Systems, 2024, 18 (09): : 2546 - 2563
  • [9] Thermal protection of the newborn in resource-limited environments
    K Lunze
    D H Hamer
    [J]. Journal of Perinatology, 2012, 32 : 317 - 324
  • [10] Thermal protection of the newborn in resource-limited environments
    Lunze, K.
    Hamer, D. H.
    [J]. JOURNAL OF PERINATOLOGY, 2012, 32 (05) : 317 - 324