A Remote User Authentication Scheme with Anonymity for Mobile Devices

نویسندگان

  • Soobok Shin
  • Kangseok Kim
  • Ki-Hyung Kim
  • Hongjin Yeh
چکیده

With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e‐commerce. When a remote server provides such e‐commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card‐based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card‐based authentication scheme, but also secure authentication functions. A smart card performs a simple one‐way hash function, the operations of exclusive‐or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Improved Efficient Authentication Scheme with Anonymity in Global Mobility Networks

A number of user authentication schemes have been proposed to provide roaming services in the global mobility network (GLOMONET). However, most of these schemes are based on an asymmetric cryptosystem, which has a higher computational cost. To achieve computational efficiency, Chang et al. proposed an authentication scheme using simple hash functions for mobile devices in the GLOMONET. However,...

متن کامل

An enhanced biometrics-based remote user authentication scheme using mobile devices

Remote user authentication is a mechanism, in which the remote server verifies the legitimacy of a user over an insecure communication channel. Recently, Wang and Li proposed a fingerprint-based remote user authentication scheme using mobile devices. We demonstrate that their scheme is vulnerable and susceptible to many attacks and has some practical pitfalls. To solve these problems, we propos...

متن کامل

Security Enhancements of a Remote User Authentication Scheme Preserving User Anonymity

Recently, user authentication scheme in e-commerce and m-commerce has been becoming one of important security issues. In 2008, Bindu et al. proposed an improved remote user authentication scheme preserving user anonymity. In this paper, we analyze the security of Bindu et al.’s authentication scheme, and we demonstrate that their scheme is still insecure against the man-in-themiddle attack, the...

متن کامل

A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications

In terms of convenience requirements, mobile communications have become one of the most important roaming services for wireless environments. Especially, how to prevent unauthorized users from illegitimate accesses in mobile communication systems has become an important issue. Password authentication with smart card is one of the mechanisms that were widely used to authenticate the validity of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012