More secure smart card-based remote user password authentication scheme with user anonymity

被引:50
|
作者
Kumari, Saru [1 ]
Khan, Muhammad Khurram [2 ]
机构
[1] Dr BRA Univ, Dept Math, Agra Coll, Agra, Uttar Pradesh, India
[2] King Saud Univ, Riyadh 11653, Saudi Arabia
关键词
cryptanalysis; user authentication; smart card; anonymity; IMPROVEMENT; EFFICIENT; CRYPTANALYSIS;
D O I
10.1002/sec.916
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2009, Xu et al. designed a smart card-based user authentication scheme. It was found at risk of offline password guessing and forgery attacks as proved by Sood et al. They also proposed an improvement to Xu et al.'s scheme with a view to fix its defects. Parallel to Sood et al.'s work, Song also identified that a domestic but illicit user of the system can impersonate other innocent users. Later, Chen et al. claimed that designs of Sood et al.'s and Song's schemes are not flawless, and they built a scheme over both of these schemes. In 2013, Li et al. observed absence of forward secrecy and lack of password validity test by smart card in Chen et al.'s scheme. They also asserted password change phase of Chen et al.'s scheme as unfriendly and inefficient and gave rise to a new scheme. However, we discover many flaws including offline password guessing and impersonation threats in Li et al.'s scheme. We find that none of the aforementioned schemes provide user anonymity. Therefore, we propose a user authentication scheme with user anonymity. The analysis shows that our scheme retains merits of its predecessor schemes, is free from faults identified in these schemes, and also offers some extra features that make it more suitable for practical applications. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:2039 / 2053
页数:15
相关论文
共 50 条
  • [1] SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY
    Li, Chun-Ta
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (02): : 157 - 162
  • [2] Cryptanalysis of a Sensor Smart Card Based Password Authentication Scheme with User Anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. SENSOR LETTERS, 2013, 11 (11) : 2149 - 2151
  • [3] An enhanced smart card based remote user password authentication scheme
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (05) : 1365 - 1371
  • [4] Security Enhancements of Smart Card-Based Remote User Password Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 669 - 674
  • [5] Smart Card Based Password Authentication and User Anonymity Scheme using ECC and Steganography
    Singh, Vineeta
    Dahiya, Priyanka
    Singh, Sanjay
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1614 - 1621
  • [6] A pairing-based password authentication scheme using smart card with user anonymity
    Jiang, Linmei
    Dai, Songsong
    Liu, Niansheng
    Guo, Donghui
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2015, 9 (01) : 12 - 22
  • [7] Smart Card Based User Authentication Scheme with Anonymity
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 220 - 233
  • [8] Robust smart-card-based remote user password authentication scheme
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) : 377 - 389
  • [9] Weakness and Improvement of the Smart Card Based Remote User Authentication Scheme with Anonymity
    Lee, Yung-Cheng
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (06) : 1121 - 1134
  • [10] Improvements of a Remote User Password Authentication Scheme using Smart Card
    Shin, Kwang Cheul
    Huh, Won Whoi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 119 - 126