A Remote User Authentication Scheme with Anonymity for Mobile Devices
Reads0
Chats0
TLDR
A smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user and also provides user anonymity using a dynamic identity and key agreement, and secure password change is proposed.Abstract:
With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.read more
Citations
More filters
Journal ArticleDOI
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
TL;DR: The proposed scheme is more efficient and covers the identified vulnerability of existing scheme, so the existing scheme is unsuitable for real implementation and more suitable to apply real-life application.
Proceedings ArticleDOI
From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges
TL;DR: An overview of transformation requirements needed in transition from the gadget to gadget-free world is provided and an initial and tentative conceptual privacy framework is discussed in the light of the user's privacy issues.
Journal ArticleDOI
User authentication scheme preserving anonymity for ubiquitous devices
TL;DR: This paper proposes a smart card-based authentication scheme that provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources.
Book ChapterDOI
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment
TL;DR: It is proved that Chang et al's scheme is still vulnerable to impersonation attacks and session key leakage, and a different notion is used to propose time efficient scheme conducted in experiment.
Proceedings ArticleDOI
Novel human-centric force control methods of power assist robots for object manipulation
TL;DR: It is proposed to use the findings to develop control methods for human-friendly power assist robots for manipulating heavy objects in industries that may improve productivity, man-machine interactions, and human's health and safety.
References
More filters
Journal ArticleDOI
Password authentication with insecure communication
TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal Article
Proxy Signatures: Delegation of the Power to Sign Messages
Journal ArticleDOI
A dynamic ID-based remote user authentication scheme
TL;DR: This paper presents a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and do not maintain any verifier table.
Journal ArticleDOI
A secure dynamic ID based remote user authentication scheme for multi-server environment
Yi-Pin Liao,Shuenn-Shyang Wang +1 more
TL;DR: The proposed scheme only uses hashing functions to implement a robust authentication scheme for the multi-server environment and provides a secure method to update password without the help of third trusted party.
Journal ArticleDOI
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
TL;DR: An enhanced authentication scheme is proposed, which covers all the identified weaknesses of Wang et al.'s scheme and is more secure and efficient for practical application environment.