Skip to main content

Smart Card Based User Authentication Scheme with Anonymity

  • Conference paper
Future Data and Security Engineering (FDSE 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8860))

Included in the following conference series:

  • 1221 Accesses

Abstract

Mobile devices (e.g., PDA, mobile phone, tablet, and notebook PC) become necessary for a convenient and modern life. So, we can use them to access services, for examples online shopping, internet banking. In such insecure environment, we see that communications are more and more essential because they defend users and providers against illegitimate adversaries. Recently, Shin et al have proposed scientific paper entitled ’A Remote User Authentication Scheme with Anonymity for Mobile Devices’ to enhance security for remote user authentication. They claimed that their scheme is truly more secure than previous ones and it can resist various attacks. However, it is not true because their scheme’s vulnerable to insider, impersonation and replay attacks. In this paper, we present an improvement to their scheme to isolate such problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, T.H., Chen, Y.C., Shih, W.K., Wei, H.W.: An efficient anonymous authentication protocol for mobile pay-tv. Journal of Network and Computer Applications 34(4), 1131–1137 (2011)

    Article  Google Scholar 

  2. Debiao, H., Jianhua, C., Jin, H.: An id-based client authentication with key agreement protocol for mobile client-server environment on ecc with provable security. Information Fusion 13(3), 223–230 (2012)

    Article  Google Scholar 

  3. Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31, 1118–1123 (2009), http://dl.acm.org/citation.cfm?id=1595894.1596057

    Article  Google Scholar 

  4. Hwang, M.S., Lee, C.C., Tang, Y.L.: A simple remote user authentication scheme. Mathematical and Computer Modelling 36, 103–107 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  5. Islam, S.H., Biswas, G.P.: A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software 84(11), 1892–1898 (2011)

    Article  Google Scholar 

  6. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

  7. Lee, C.C., Hwang, M.S., Yang, W.P.: Flexible remote user authentication scheme using smart cards. IEEE Transactions on Neural Network 36(3), 46–52 (2002)

    Google Scholar 

  8. Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Network 12(6), 1498–1504 (2001)

    Article  Google Scholar 

  9. Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 629–631 (2004)

    Article  Google Scholar 

  10. Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic id-based remote user authentication scheme. In: International Conference on Next Generation Web Services Practices, vol. 6(2), pp. 517–522 (2005)

    Google Scholar 

  11. Liao, Y.P., Wang, S.S.: A secure dynamic id based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31, 24–29 (2009), http://dx.doi.org/10.1016/j.csi.2007.10.007

    Article  Google Scholar 

  12. Khan, M.K., Kumari, S., Gupta, M.K.: More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9), 793–816 (2013)

    Article  MathSciNet  Google Scholar 

  13. Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 49(2), 414–416 (2003)

    Article  Google Scholar 

  14. Shin, S., Kim, K., Kim, K.H., Yeh, H.: A remote user authentication scheme with anonymity for mobile devices. International Journal of Advanced Robotic Systems 9, 1–7 (2012)

    Article  Google Scholar 

  15. Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic id-based remote user authentication scheme. Computer Communications 32, 583–585 (2009)

    Article  Google Scholar 

  16. Yang, J.H., Chang, C.C.: An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 28(3-4), 138–143 (2009)

    Article  Google Scholar 

  17. Yoon, E.-J., Yoo, K.-Y.: Improving the dynamic ID-based remote mutual authentication scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499–507. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Yoon, E.J., Yoo, K.Y.: Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. In: IEEE International Conference on Computational Science and Engineering, vol. 2, pp. 633–640 (2009)

    Google Scholar 

  19. Zhang, J., Deng, F.: The authentication and key agreement protocol based on ecc for wireless communications. In: International Conference on Management and Service Science, pp. 1–4 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Truong, TT., Tran, MT., Duong, AD. (2014). Smart Card Based User Authentication Scheme with Anonymity. In: Dang, T.K., Wagner, R., Neuhold, E., Takizawa, M., Küng, J., Thoai, N. (eds) Future Data and Security Engineering. FDSE 2014. Lecture Notes in Computer Science, vol 8860. Springer, Cham. https://doi.org/10.1007/978-3-319-12778-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12778-1_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12777-4

  • Online ISBN: 978-3-319-12778-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics