A modified dynamic ID-based remote user authentication scheme

被引:8
|
作者
Zhang, Xin [1 ]
Feng, Quanyuan [2 ]
Li, Miao [2 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Sichuan, Peoples R China
[2] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Peoples R China
来源
2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING | 2006年
关键词
D O I
10.1109/ICCCAS.2006.284979
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
User authentication is the primacy safeguard of information security and network security. Password authentication is the most widely used means for remote user authentication. In this paper, we analyze a dynamic ID-based remote user authentication scheme and point out its security vulnerability. Once the adversary obtains a user's smart card, the adversary can masquerade as the legal user to login a remote server even without the user's password. Further more, an enhanced scheme is presented. The modified scheme can resist replay attack, forgery attack, guessing attack, insider attack and masquerade attack.
引用
收藏
页码:1602 / +
页数:2
相关论文
共 50 条
  • [21] Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment
    He, Debiao
    Huang, Yin
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (01) : 43 - 53
  • [22] Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1072 - 1076
  • [23] Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
    Ku, WC
    Chang, ST
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2165 - 2167
  • [24] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
  • [25] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
  • [26] IMPROVED ID-BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1672 - 1677
  • [27] DYNAMIC ID-BASED REMOTE USER MUTUAL AUTHENTICATION SCHEME WITH SMARTCARD USING ELLIPTIC CURVE CRYPTOGRAPHY
    SK Hafizul Islam
    G.P.Biswas
    JournalofElectronics(China), 2014, 31 (05) : 473 - 488
  • [28] Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
    Khan, Muhammad Khurram
    Kim, Soo-Kyun
    Alghathbar, Khaled
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 305 - 309
  • [29] Attacks on Young-Hwa An's Improved Dynamic ID-based Remote User Authentication Scheme
    Xu, Cheng-Qiang
    Zhang, Zhen-Li
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5235 - 5238
  • [30] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101