Abstract
Mobile devices (e.g., PDA, mobile phone, tablet, and notebook PC) become necessary for a convenient and modern life. So, we can use them to access services, for examples online shopping, internet banking. In such insecure environment, we see that communications are more and more essential because they defend users and providers against illegitimate adversaries. Recently, Shin et al have proposed scientific paper entitled ’A Remote User Authentication Scheme with Anonymity for Mobile Devices’ to enhance security for remote user authentication. They claimed that their scheme is truly more secure than previous ones and it can resist various attacks. However, it is not true because their scheme’s vulnerable to insider, impersonation and replay attacks. In this paper, we present an improvement to their scheme to isolate such problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, T.H., Chen, Y.C., Shih, W.K., Wei, H.W.: An efficient anonymous authentication protocol for mobile pay-tv. Journal of Network and Computer Applications 34(4), 1131–1137 (2011)
Debiao, H., Jianhua, C., Jin, H.: An id-based client authentication with key agreement protocol for mobile client-server environment on ecc with provable security. Information Fusion 13(3), 223–230 (2012)
Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31, 1118–1123 (2009), http://dl.acm.org/citation.cfm?id=1595894.1596057
Hwang, M.S., Lee, C.C., Tang, Y.L.: A simple remote user authentication scheme. Mathematical and Computer Modelling 36, 103–107 (2002)
Islam, S.H., Biswas, G.P.: A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software 84(11), 1892–1898 (2011)
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)
Lee, C.C., Hwang, M.S., Yang, W.P.: Flexible remote user authentication scheme using smart cards. IEEE Transactions on Neural Network 36(3), 46–52 (2002)
Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Network 12(6), 1498–1504 (2001)
Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 629–631 (2004)
Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic id-based remote user authentication scheme. In: International Conference on Next Generation Web Services Practices, vol. 6(2), pp. 517–522 (2005)
Liao, Y.P., Wang, S.S.: A secure dynamic id based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31, 24–29 (2009), http://dx.doi.org/10.1016/j.csi.2007.10.007
Khan, M.K., Kumari, S., Gupta, M.K.: More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9), 793–816 (2013)
Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 49(2), 414–416 (2003)
Shin, S., Kim, K., Kim, K.H., Yeh, H.: A remote user authentication scheme with anonymity for mobile devices. International Journal of Advanced Robotic Systems 9, 1–7 (2012)
Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic id-based remote user authentication scheme. Computer Communications 32, 583–585 (2009)
Yang, J.H., Chang, C.C.: An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 28(3-4), 138–143 (2009)
Yoon, E.-J., Yoo, K.-Y.: Improving the dynamic ID-based remote mutual authentication scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499–507. Springer, Heidelberg (2006)
Yoon, E.J., Yoo, K.Y.: Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. In: IEEE International Conference on Computational Science and Engineering, vol. 2, pp. 633–640 (2009)
Zhang, J., Deng, F.: The authentication and key agreement protocol based on ecc for wireless communications. In: International Conference on Management and Service Science, pp. 1–4 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Truong, TT., Tran, MT., Duong, AD. (2014). Smart Card Based User Authentication Scheme with Anonymity. In: Dang, T.K., Wagner, R., Neuhold, E., Takizawa, M., Küng, J., Thoai, N. (eds) Future Data and Security Engineering. FDSE 2014. Lecture Notes in Computer Science, vol 8860. Springer, Cham. https://doi.org/10.1007/978-3-319-12778-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-12778-1_17
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12777-4
Online ISBN: 978-3-319-12778-1
eBook Packages: Computer ScienceComputer Science (R0)