Proceedings ArticleDOI
Security enhancement for a dynamic ID-based remote user authentication scheme
I-En Liao,Cheng-Chi Lee,Min-Shiang Hwang +2 more
- pp 437-440
TLDR
This paper shows that Das, Saxena, and Gulati's scheme has some attacks, and proposes a slight modification to their scheme to improve their weaknesses, and shows that the improved scheme can enhance the security of Das and Saxena's scheme.Abstract:
In a paper recently published in the IEEE transaction on consumer electronics, Das, Saxena, and Gulati proposed a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and does not maintain any verifier table. It can protect against ID-theft, replaying, forgery, guessing, insider, and stolen verifier attacks. However, this paper shows that Das, Saxena, and Gulati's scheme has some attacks. Therefore, we propose a slight modification to their scheme to improve their weaknesses. As a result, the improved scheme can enhance the security of Das, Saxena, and Gulati's scheme. In addition, the proposed scheme does not add many computational costs additionally. Compare with their scheme, our scheme is also efficient.read more
Citations
More filters
Journal ArticleDOI
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
TL;DR: An enhanced authentication scheme is proposed, which covers all the identified weaknesses of Wang et al.'s scheme and is more secure and efficient for practical application environment.
Journal ArticleDOI
A secure dynamic identity based authentication protocol for multi-server architecture
TL;DR: This paper presents a secure dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned security flaws, while keeping the merits of Hsiang and Shih's protocol.
Proceedings ArticleDOI
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
TL;DR: It is shown that Wong et al.'s scheme is vulnerable to the replay and forgery attacks, and a lightweight dynamic user authentication scheme for WSNs is proposed that retains all the advantages but enhances its security by withstanding the security weaknesses and allows legitimate users to change their passwords freely.
Journal ArticleDOI
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
R. Madhusudhan,R. C. Mittal +1 more
TL;DR: All the security requirements and all the goals an ideal password authentication scheme should satisfy and achieve are defined and presented through six currently available dynamic ID based remote user authentication schemes.
Journal ArticleDOI
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
SK Hafizul Islam,G. P. Biswas +1 more
TL;DR: An enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique that supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability is proposed.
References
More filters
Journal ArticleDOI
Wireless sensor networks: a survey
TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Journal ArticleDOI
Sensor networks: evolution, opportunities, and challenges
Chee-Yee Chong,Sanjeev Kumar +1 more
TL;DR: The history of research in sensor networks over the past three decades is traced, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spanning this period: the Distributed Sensor Networks (DSN) and the Sensor Information Technology (SensIT) programs.
Journal ArticleDOI
Password authentication with insecure communication
TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI
A dynamic ID-based remote user authentication scheme
TL;DR: This paper presents a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and do not maintain any verifier table.
Proceedings ArticleDOI
A dynamic user authentication scheme for wireless sensor networks
TL;DR: This paper proposes a dynamic strong-password based solution to this access control problem and adapt it into a wireless sensor network environment and discusses how to make use of the security features on MAC sublayer (medium access control) based on the IEEE 802.15.4 specification.