Security analysis of 'an improved low computation cost user authentication scheme for mobile communication'

被引:0
|
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
机构
[1] SW Jiao Tong Univ, Sichuan Key Lab Signal & Informat PRocessing, Res Grp Biometr & Secur, Chengdu 610031, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Lee et al. proposed 'an improved low computation cost user authentication scheme for mobile communication'. We demonstrate that their scheme is vulnerable and susceptible to the attacks and can be easily cryptanalyzed. We point out that their scheme performs unilateral'authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suscepts from the server spoofing attack. Furthermore, an adversary can impersonate legitimate users by copying data of their stolen or lost smart card. Moreover, Lee et al.'s scheme is poorly reparable, which makes their method infeasible to implement.
引用
收藏
页码:276 / 279
页数:4
相关论文
共 50 条
  • [21] Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks
    Liu, Wenfen
    Zhou, Gang
    Wei, Jianghong
    Hu, Xuexian
    Kumari, Saru
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 275 - 294
  • [22] Improved security enhancement for a dynamic ID-based remote user authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (565-567+621):
  • [23] An Improved User-Participating Authentication Scheme
    Shi, Huang
    Cao, Tianjie
    Gao Caiyun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 115 - 124
  • [24] Further Improved Remote User Authentication Scheme
    Kim, Jung-Yoon
    Choi, Hyoung-Kee
    Copeland, John A.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1426 - 1433
  • [25] Improved remote user authentication scheme preserving user anonymity
    Hu, Lanlan
    Yang, Yixian
    Niu, Xinxin
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 323 - +
  • [26] Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Kang, Miyoung
    Rhee, Hyun Sook
    Choi, Jin-Young
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 860 - 864
  • [27] Practical anonymous user authentication scheme with security proof
    Chien, Hung-Yu
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 216 - 223
  • [28] Security enhancements of a remote user authentication scheme preserving user anonymity
    An, Younghwa
    Yang, Hyungkyu
    International Journal of Multimedia and Ubiquitous Engineering, 2013, 8 (01): : 129 - 138
  • [29] User perspective and security of a new mobile authentication method
    Laka, Pawel
    Mazurczyk, Wojciech
    TELECOMMUNICATION SYSTEMS, 2018, 69 (03) : 365 - 379
  • [30] User perspective and security of a new mobile authentication method
    Pawel Laka
    Wojciech Mazurczyk
    Telecommunication Systems, 2018, 69 : 365 - 379