Abstract
In 2012, Kim et al. analyzed Martinez-Pelaez et al.’s dynamic IDbased remote user authentication scheme with session key agreement for multiserver environment. They described that Martinez-Pelaez et al.’s scheme is vulnerable to masquerade attack, server spoofing attack, stolen smart card attack, and is not easily repairable. In this paper, we show how to solve the vulnerabilities in Martinez-Pelaez et al.’s scheme.
This research was supported by the KCC(Korea Communications Commission), Korea, under the R&D program supervised by the KCA(Korea Communications Agency) (KCA-2012-12-912-06-003).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Liao, Y.P., Wang, S.S.: A secure dynamic ID-based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 31(6), 24–29 (2009)
Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 31(6), 1118–1123 (2009)
Martinez-Pelaez, R., Rico-Novella, F., Satizabal, C., Pomykala, J.: Efficient and secure dynamic ID-based remote user authentication scheme with session key agreement for multi-server environment. Journal of Network Security & its Applications (IJNSA) 2(4), 106–116 (2010)
Kim, M., Park, N., Won, D.: Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment. In: Park, J.H(J.), Kim, J., Zou, D., Lee, Y.S. (eds.) ITCS & STA 2012. LNEE, vol. 180, pp. 233–240. Springer, Heidelberg (2012)
Jeong, H., Won, D., Kim, S.: Weaknesses and improvement of secure hash-based strong-password authentication protocol. Journal of Information Science and Engineering 26(5), 1845–1858 (2010)
Lee, Y., Kim, S., Won, D.: Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Elsevier Computers and Electrical Engineering 36(1), 213–223 (2010)
Nam, J., Paik, J., Won, D.: Security improvement on Wu and Zhu protocol for password-authentication group key exchange. IEICE Trans. Fundamentals E94-A(2), 865–868 (2010)
Jeon, W., Kim, J., Nam, J., Lee, Y., Won, D.: An enhanced secure authentication scheme with anonymity for wireless environments. IEICE Transactions on Communications E95-B(7), 2505–2508 (2012)
Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, M., Park, N., Won, D. (2012). Security Improvement on a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment. In: Kim, Th., et al. Computer Applications for Security, Control and System Engineering. Communications in Computer and Information Science, vol 339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35264-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-35264-5_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35263-8
Online ISBN: 978-3-642-35264-5
eBook Packages: Computer ScienceComputer Science (R0)