A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

نویسندگان

  • Chun-Ta Li
  • Cheng-Chi Lee
  • Chi-Yao Weng
  • Chun-I Fan
چکیده

CHUN-TA LI, CHENG-CHI LEE, CHI-YAO WENG AND CHUN-I FAN Department of Information Management Tainan University of Technology Tainan City, 710 Taiwan E-mail: [email protected] Department of Library and Information Science Fu Jen Catholic University New Taipei City, 242 Taiwan E-mail: [email protected] Department of Photonics and Communication Engineering Asia University Taichung City, 413 Taiwan Department of Computer Science National Pingtung University Pingtung City, 900 Taiwan E-mail: [email protected] Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung City, 804 Taiwan E-mail: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Identity Based Authentication Protocol for Two-Server Architecture

Most of the password based authentication protocols make use of the single authentication server for user’s authentication. User’s verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server architecture based authentication protocols make it difficult for the attacker to find out any signi...

متن کامل

Cryptanalysis of Sood et al.’s Dynamic Identity Based Authentication Protocol for Multi-Server Architecture

Sood, Sarje, and Singh recently proposed a secure dynamic identity-based (ID-based) authentication protocol for multi-server architectures utilizing smart cards, wherein they reveal security weaknesses of Hsiang and Shih’s dynamic identity-based remote user authentication scheme. Sood et al. claim their proposed scheme can provide protection from various attacks such as replay, malicious user, ...

متن کامل

A Novel Dynamic Identity based Authentication Scheme for Multi- Server Environment using Smart Cards

Remote user authentication scheme with key agreement is a very practical mechanism to verify a remote user and then provide secure communication. Furthermore, many network environments have been becoming multi-server based due to the rapid growth of computer networks. Therefore, more and more researches have been focused on proposing smart card based remote authentication scheme with session ke...

متن کامل

A Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems

Abstract—Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote server has been used. These remote schemes resis...

متن کامل

A Secure and Efficient Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards

Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee-Lin-Chang's scheme is still vulnerable to stolen smart card attack and malicious server attack. Besides, the passw...

متن کامل

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol

Password is the most commonly used authentication technique in smart card based authentication protocols. During communication, the static identity based authentication protocols leaks out the user’s authentication messages corresponding to static identity to the attacker. Therefore, the attacker can trace and identify the different requests belonging to the same user. On the other hand, the dy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2015