User authentication scheme preserving anonymity for ubiquitous devices

被引:12
|
作者
Djellali, Benchaa [1 ,2 ]
Belarbi, Kheira [1 ]
Chouarfia, Abdallah [1 ]
Lorenz, Pascal [2 ]
机构
[1] Univ Sci & Technol Oran, Dept Comp Sci, Oran 31000, Algeria
[2] Univ Haute Alsace, GRTC, F-68000 Colmar, France
关键词
user authentication; smart card; password; anonymity; ubiquitous device; PASSWORD AUTHENTICATION; CRYPTANALYSIS; EFFICIENT; PROTOCOL;
D O I
10.1002/sec.1238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card-based authentication scheme that aims to provide more functionality to resist well-known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3131 / 3141
页数:11
相关论文
共 50 条
  • [21] Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare
    Masud, Mehedi
    Gaba, Gurjot Singh
    Choudhary, Karanjeet
    Hossain, M. Shamim
    Alhamid, Mohammed F.
    Muhammad, Ghulam
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2649 - 2656
  • [22] Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Kang, Miyoung
    Rhee, Hyun Sook
    Choi, Jin-Young
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 860 - 864
  • [23] A bilateral remote user authentication scheme that preserves user anonymity
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) : 301 - 308
  • [24] A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems
    Tan, Zuowen
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (03)
  • [25] A Robust Anonymity Preserving Authentication Protocol for IoT Devices
    Tewari, Aakanksha
    Gupta, B. B.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [26] A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
    Wen, Fengtong
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)
  • [27] A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems
    Zuowen Tan
    [J]. Journal of Medical Systems, 2014, 38
  • [28] A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
    Fengtong Wen
    [J]. Journal of Medical Systems, 2013, 37
  • [29] Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks
    Gope, Prosanta
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 160 - 167
  • [30] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080