scispace - formally typeset
Open AccessJournal ArticleDOI

A Remote User Authentication Scheme with Anonymity for Mobile Devices

Reads0
Chats0
TLDR
A smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user and also provides user anonymity using a dynamic identity and key agreement, and secure password change is proposed.
Abstract
With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

read more

Citations
More filters
Journal ArticleDOI

Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain

TL;DR: The proposed scheme is more efficient and covers the identified vulnerability of existing scheme, so the existing scheme is unsuitable for real implementation and more suitable to apply real-life application.
Proceedings ArticleDOI

From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges

TL;DR: An overview of transformation requirements needed in transition from the gadget to gadget-free world is provided and an initial and tentative conceptual privacy framework is discussed in the light of the user's privacy issues.
Journal ArticleDOI

User authentication scheme preserving anonymity for ubiquitous devices

TL;DR: This paper proposes a smart card-based authentication scheme that provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources.
Book ChapterDOI

Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment

TL;DR: It is proved that Chang et al's scheme is still vulnerable to impersonation attacks and session key leakage, and a different notion is used to propose time efficient scheme conducted in experiment.
Proceedings ArticleDOI

Novel human-centric force control methods of power assist robots for object manipulation

TL;DR: It is proposed to use the findings to develop control methods for human-friendly power assist robots for manipulating heavy objects in industries that may improve productivity, man-machine interactions, and human's health and safety.
References
More filters
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

A dynamic ID-based remote user authentication scheme

TL;DR: This paper presents a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and do not maintain any verifier table.
Journal ArticleDOI

A secure dynamic ID based remote user authentication scheme for multi-server environment

TL;DR: The proposed scheme only uses hashing functions to implement a robust authentication scheme for the multi-server environment and provides a secure method to update password without the help of third trusted party.
Journal ArticleDOI

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

TL;DR: An enhanced authentication scheme is proposed, which covers all the identified weaknesses of Wang et al.'s scheme and is more secure and efficient for practical application environment.
Related Papers (5)
Trending Questions (1)
How to change your email on Rockstar Social Club without password?

The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.