Two-Factor Dynamic ID-Based Remote User Authentication Scheme

被引:0
|
作者
Huang, Renjun [1 ]
Su, Fengfu [1 ]
Chen, Yangyi [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
关键词
dynamic ID; two-factor security; user authentication; smart card; password; PASSWORD AUTHENTICATION; SMART;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Most of password authentication schemes are based on static identity, the adversary can use this information to trace and identify the user's requests. This paper proposes two-factor dynamic ID-based remote user authentication scheme. Because of two-factor security, the intruder can not impersonate an authorized user to access server or network with only compromising one factor from the password or smart card. The authorized user will anonymously access server or network by the Dynamic ID. The proposed scheme provides mutual authentication, perfect forward secrecy, and resists the replay attack, password guessing attack, stolen-verifier attack and impersonating attack.
引用
收藏
页码:373 / 377
页数:5
相关论文
共 17 条
  • [1] AWASHN AK, SEC ANAL DYN ID BAS
  • [2] Chen CM, 2002, IEICE T COMMUN, VE85B, P2519
  • [3] Chien HY, 2005, AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, P245
  • [4] A dynamic ID-based remote user authentication scheme
    Das, ML
    Saxena, A
    Gulati, VP
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 629 - 631
  • [5] An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Cards
    Gao, Zhengxian
    Tu, Yaqing
    [J]. 2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 4562 - 4567
  • [6] A new remote user authentication scheme using smart cards
    Hwang, MS
    Li, LH
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 28 - 30
  • [7] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [8] PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION
    LAMPORT, L
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 770 - 772
  • [9] LEE YC, 2008, MACH LEARN CYB 2008, V6, P3283
  • [10] LIAO IE, 2005, SECURITY ENHANCEMENT, P22