Robust and simple authentication protocol

被引:17
|
作者
Chien, HY [1 ]
Jan, JK
机构
[1] NanKai Coll, Dept Informat Management, Nantou, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
来源
COMPUTER JOURNAL | 2003年 / 46卷 / 02期
关键词
D O I
10.1093/comjnl/46.2.193
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Password-based authentication protocols are currently the conventional authentication protocols in many distributed systems. However, the security of these protocols is falling behind the times because more and more attacks can now break them. The security weaknesses of the Simple And Secure (SAS) protocol, the Optimal Strong-Password Authentication (OSPA) protocol, and the revised SAS protocols are examined in this paper. We then propose our RObust and SImple (ROSI) protocol to help raise security levels. The ROSI protocol can be easily implemented and has lower communication costs than most other protocols.
引用
收藏
页码:193 / 201
页数:9
相关论文
共 50 条
  • [21] A Robust Anonymity Preserving Authentication Protocol for IoT Devices
    Tewari, Aakanksha
    Gupta, B. B.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [22] A Scalable Robust Authentication Protocol for Secure Vehicular Communications
    Zhang, Lei
    Wu, Qianhong
    Solanas, Agusti
    Domingo-Ferrer, Josep
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (04) : 1606 - 1617
  • [23] Robust Pre-Authentication Protocol for Wireless Network
    Abdrabou, Mohammed Aly
    [J]. 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 331 - 336
  • [24] A robust and simple protocol for the synthesis of arylfluorophosphonates
    Leypold, Mario
    Wallace, Paal W.
    Kljajic, Marko
    Schittmayer, Matthias
    Pletz, Jakob
    Illaszewicz-Trattner, Carina
    Guebitz, Georg M.
    Birner-Gruenberger, Ruth
    Breinbauer, Rolf
    [J]. TETRAHEDRON LETTERS, 2015, 56 (41) : 5619 - 5622
  • [25] A simple protocol for deniable authentication based on ElGamal cryptography
    Wang, YJ
    Li, JH
    Tie, L
    [J]. NETWORKS, 2005, 45 (04) : 193 - 194
  • [26] A Simple Authentication Scheme and Access Control Protocol for VANETs
    Wu, Wei-Chen
    Chen, Yi-Ming
    [J]. UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 259 - 272
  • [27] Robust and simple N-party entangled authentication cloud storage protocol based on secret sharing scheme
    Zhu, Hongfeng
    Liu, Tianhua
    Zhu, Dan
    Li, Haiyang
    [J]. Journal of Information Hiding and Multimedia Signal Processing, 2013, 4 (02): : 110 - 117
  • [28] Simple Lightweight Authentication Protocol: Security and Performance Considerations
    Godor, Gyozo
    Imre, Sandor
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2010, 6 (03) : 66 - 94
  • [29] Advance improvement on the simple authentication key agreement protocol
    Deng, Chao
    Deng, Shaoyi
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 495 - 497
  • [30] A robust ECC based mutual authentication protocol with anonymity for session initiation protocol
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Li, Linsen
    Alzahrani, Bander
    [J]. PLOS ONE, 2017, 12 (10):