Weakness of remote authentication scheme of Chen et al.

被引:5
|
作者
Tang, Hong-bin [1 ]
Liu, Xin-song [2 ]
Chen, Jian-ying [3 ]
机构
[1] CEPREI Certificat Body, Guangzhou 510610, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[3] Southwest Univ Nationalities, Coll Comp Sci Technol, Chengdu 610041, Peoples R China
关键词
mobile device; fingerprint; password; authentication; protocol; cryptography;
D O I
10.1002/dac.2534
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The extensive application of mobile commerce has led researchers to design more secure protocols for mobile devices during the recent years. In 2011, Chen et al. proposed a three-factor mobile device-based remote authentication scheme, which tackled the security risk imposed by the loss of both password and mobile device. Scheme of Chen et al., however, is still vulnerable to the privileged insider attack, the replay attack, the impersonation attack, and the denial of service attack. It is not feasible for real-life implementation. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:3199 / 3203
页数:5
相关论文
共 50 条
  • [41] Smart-card-loss-attack and Improvement of Hsiang et al.'s Authentication Scheme
    Lee, Y. C.
    [J]. JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2013, 11 : 597 - 603
  • [42] The Luo, et al. v. Chen Case on Surrogacy
    Liang Wenwen
    [J]. CHINESE JOURNAL OF INTERNATIONAL LAW, 2022, 20 (04) : 839 - 843
  • [43] Multidisciplinary Management of Cancer Pain: Commentary on Chen et al.
    Waldfogel, Julie M.
    Dy, Sydney M.
    [J]. JOURNAL OF PAIN AND SYMPTOM MANAGEMENT, 2014, 48 (04) : 497 - 498
  • [44] Theoretical and practical progress of new heliostat by Chen et al.
    Kribus, A
    [J]. COMMUNICATIONS IN THEORETICAL PHYSICS, 2006, 45 (01) : 163 - 164
  • [45] Theoretical and Practical Progress of New Heliostat by Chen et al.
    A.Kribus School of Mechanical Engineering Faculty of Engineering
    [J]. Communications in Theoretical Physics, 2006, 45 (01) : 163 - 164
  • [46] Evaluation of Chen et al.: Overexpression of Protein Complexes and Aneuploidy
    Amon, Angelika
    [J]. CELL SYSTEMS, 2019, 9 (02) : 107 - 108
  • [47] Boundary of ecosystem services: A response to Chen et al. (2023)
    Gray, Murray
    Fox, Nathan
    Gordon, John E.
    Brilha, Jose
    Charkraborty, Abhik
    Garcia, Maria da Gloria
    Hjort, Jan
    Kubalikova, Lucie
    Seijmonsbergen, Arie C.
    Urban, Jan
    [J]. JOURNAL OF ENVIRONMENTAL MANAGEMENT, 2024, 351
  • [48] Weakness Cryptanalysis of Liao's Scheme and Improved Remote User Authentication Scheme for Mobile Device
    Do Kim, Hie
    Shin, Kwang Cheul
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 11 - 19
  • [49] Weakness and Improvement of the Smart Card Based Remote User Authentication Scheme with Anonymity
    Lee, Yung-Cheng
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (06) : 1121 - 1134
  • [50] Further analysis and improvement of Yoon et al.'s hash-based user authentication scheme
    Wang Bang-Ju
    Li Shu-Hua
    Zhang Huan-Guo
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 480 - +