scispace - formally typeset
Book ChapterDOI

A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices

TLDR
This paper proposes a new remote mutual authentication scheme in wireless environment without maintaining the password table based on ElGamal’s, which provides high security and mutual authentication at a reasonable computational cost.
Abstract
User authentication is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs), Smartcard, Laptops User authentication is a difficult for every system providing safe access to precious, private information, or personalized services User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users Remote mutual authentication is the best solution for remote accessing in Wi-Fi environment In this paper we propose a new remote mutual authentication scheme in wireless environment without maintaining the password table This is based on ElGamal’s It provides high security and mutual authentication at a reasonable computational cost Furthermore it restricts most of the current attacking mechanisms It is simple and can be adopted in any kind of lightweight devices

read more

References
More filters
Journal ArticleDOI

New remote user authentication scheme using smart cards

TL;DR: A new remote user authentication scheme using smart cards that is secure against Chan-Cheng and all the extended attacks is presented.
Journal ArticleDOI

Using smart cards to authenticate remote passwords

TL;DR: A new remote password authentication scheme without password tables is proposed, where each legal user has his/her identity, password and smart card and the system can validate whether the login user is a legal one or not.
Journal ArticleDOI

An enhanced remote user authentication scheme using smart cards

TL;DR: Shen, Lin and Hwang's scheme to overcome a different type of attack on this remote user authentication scheme and it is enhanced to overcome these attacks.
Journal ArticleDOI

Limitations of challenge-response entity authentication

TL;DR: This work considers two basic versions of the challenge-response authentication protocol, and exhibits both a method of attack and a simple modification preventing such attacks.
Related Papers (5)