Weakness of remote authentication scheme of Chen et al.

被引:5
|
作者
Tang, Hong-bin [1 ]
Liu, Xin-song [2 ]
Chen, Jian-ying [3 ]
机构
[1] CEPREI Certificat Body, Guangzhou 510610, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[3] Southwest Univ Nationalities, Coll Comp Sci Technol, Chengdu 610041, Peoples R China
关键词
mobile device; fingerprint; password; authentication; protocol; cryptography;
D O I
10.1002/dac.2534
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The extensive application of mobile commerce has led researchers to design more secure protocols for mobile devices during the recent years. In 2011, Chen et al. proposed a three-factor mobile device-based remote authentication scheme, which tackled the security risk imposed by the loss of both password and mobile device. Scheme of Chen et al., however, is still vulnerable to the privileged insider attack, the replay attack, the impersonation attack, and the denial of service attack. It is not feasible for real-life implementation. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:3199 / 3203
页数:5
相关论文
共 50 条
  • [31] Letter to the editor regarding the article of Chen et al.
    Islamoglu, Mehmet Sami
    Gulcicek, Sibel
    Seyahi, Nurhan
    [J]. RENAL FAILURE, 2022, 44 (01) : 860 - 861
  • [32] Cryptanalysis of Yang et al.'s Handover Authentication Scheme For Mobile Network Environment
    Deng, Yong-Yuan
    Chen, Chin-Ling
    Shin, Jungpil
    Wang, Kun-hao
    [J]. 2017 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC), 2017, : 152 - 157
  • [33] Security of Shen et al.'s timestamp-based password authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671
  • [34] On the Security of Zhou et al.'s Authentication and Integrity Scheme for Digital Mammography Images
    Goh, A. W. T.
    Razali, E.
    Phan, R. C. W.
    Wong, M. L. D.
    [J]. 4TH KUALA LUMPUR INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING 2008, VOLS 1 AND 2, 2008, 21 (1-2): : 871 - +
  • [35] Letter to the Editor in response to Chen et al. 2020
    Ponnampalam, Jaya
    Seligmann, George
    Gandhi, Tanaya
    Parmar, Dilen
    [J]. RESPIRATORY RESEARCH, 2020, 21 (01)
  • [36] Weakness in Jung et al.'s ID-based conference key distribution scheme
    Nam, J
    Kim, S
    Won, D
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 213 - 218
  • [37] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.'s Scheme
    Alzahrani, Bander A.
    Irshad, Azeem
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 8239 - 8253
  • [38] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
    Bander A. Alzahrani
    Azeem Irshad
    [J]. Arabian Journal for Science and Engineering, 2018, 43 : 8239 - 8253
  • [39] An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ali, Sajid
    Kumari, Saru
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (02): : 211 - 224
  • [40] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152