scispace - formally typeset
Proceedings ArticleDOI

Security enhancement for a dynamic ID-based remote user authentication scheme

TLDR
This paper shows that Das, Saxena, and Gulati's scheme has some attacks, and proposes a slight modification to their scheme to improve their weaknesses, and shows that the improved scheme can enhance the security of Das and Saxena's scheme.
Abstract
In a paper recently published in the IEEE transaction on consumer electronics, Das, Saxena, and Gulati proposed a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and does not maintain any verifier table. It can protect against ID-theft, replaying, forgery, guessing, insider, and stolen verifier attacks. However, this paper shows that Das, Saxena, and Gulati's scheme has some attacks. Therefore, we propose a slight modification to their scheme to improve their weaknesses. As a result, the improved scheme can enhance the security of Das, Saxena, and Gulati's scheme. In addition, the proposed scheme does not add many computational costs additionally. Compare with their scheme, our scheme is also efficient.

read more

Citations
More filters
Journal ArticleDOI

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

TL;DR: An enhanced authentication scheme is proposed, which covers all the identified weaknesses of Wang et al.'s scheme and is more secure and efficient for practical application environment.
Journal ArticleDOI

A secure dynamic identity based authentication protocol for multi-server architecture

TL;DR: This paper presents a secure dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned security flaws, while keeping the merits of Hsiang and Shih's protocol.
Proceedings ArticleDOI

An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks

TL;DR: It is shown that Wong et al.'s scheme is vulnerable to the replay and forgery attacks, and a lightweight dynamic user authentication scheme for WSNs is proposed that retains all the advantages but enhances its security by withstanding the security weaknesses and allows legitimate users to change their passwords freely.
Journal ArticleDOI

Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review

TL;DR: All the security requirements and all the goals an ideal password authentication scheme should satisfy and achieve are defined and presented through six currently available dynamic ID based remote user authentication schemes.
Journal ArticleDOI

A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

TL;DR: An enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique that supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability is proposed.
References
More filters
Journal ArticleDOI

Wireless sensor networks: a survey

TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Journal ArticleDOI

Sensor networks: evolution, opportunities, and challenges

TL;DR: The history of research in sensor networks over the past three decades is traced, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spanning this period: the Distributed Sensor Networks (DSN) and the Sensor Information Technology (SensIT) programs.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

A dynamic ID-based remote user authentication scheme

TL;DR: This paper presents a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and do not maintain any verifier table.
Proceedings ArticleDOI

A dynamic user authentication scheme for wireless sensor networks

TL;DR: This paper proposes a dynamic strong-password based solution to this access control problem and adapt it into a wireless sensor network environment and discusses how to make use of the security features on MAC sublayer (medium access control) based on the IEEE 802.15.4 specification.
Related Papers (5)