Advertisement

Security Improvement on a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment

  • Mijin Kim
  • Namje Park
  • Dongho Won
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 339)

Abstract

In 2012, Kim et al. analyzed Martinez-Pelaez et al.’s dynamic IDbased remote user authentication scheme with session key agreement for multiserver environment. They described that Martinez-Pelaez et al.’s scheme is vulnerable to masquerade attack, server spoofing attack, stolen smart card attack, and is not easily repairable. In this paper, we show how to solve the vulnerabilities in Martinez-Pelaez et al.’s scheme.

Keywords

authenticated key exchange dynamic ID key agreement multiserver environment security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Liao, Y.P., Wang, S.S.: A secure dynamic ID-based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 31(6), 24–29 (2009)CrossRefGoogle Scholar
  2. 2.
    Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 31(6), 1118–1123 (2009)CrossRefGoogle Scholar
  3. 3.
    Martinez-Pelaez, R., Rico-Novella, F., Satizabal, C., Pomykala, J.: Efficient and secure dynamic ID-based remote user authentication scheme with session key agreement for multi-server environment. Journal of Network Security & its Applications (IJNSA) 2(4), 106–116 (2010)CrossRefGoogle Scholar
  4. 4.
    Kim, M., Park, N., Won, D.: Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment. In: Park, J.H(J.), Kim, J., Zou, D., Lee, Y.S. (eds.) ITCS & STA 2012. LNEE, vol. 180, pp. 233–240. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  5. 5.
    Jeong, H., Won, D., Kim, S.: Weaknesses and improvement of secure hash-based strong-password authentication protocol. Journal of Information Science and Engineering 26(5), 1845–1858 (2010)Google Scholar
  6. 6.
    Lee, Y., Kim, S., Won, D.: Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Elsevier Computers and Electrical Engineering 36(1), 213–223 (2010)CrossRefzbMATHGoogle Scholar
  7. 7.
    Nam, J., Paik, J., Won, D.: Security improvement on Wu and Zhu protocol for password-authentication group key exchange. IEICE Trans. Fundamentals E94-A(2), 865–868 (2010)CrossRefGoogle Scholar
  8. 8.
    Jeon, W., Kim, J., Nam, J., Lee, Y., Won, D.: An enhanced secure authentication scheme with anonymity for wireless environments. IEICE Transactions on Communications E95-B(7), 2505–2508 (2012)CrossRefGoogle Scholar
  9. 9.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Mijin Kim
    • 1
  • Namje Park
    • 2
  • Dongho Won
    • 1
  1. 1.College of Information and Communication EngineeringSungkyunkwan UniversitySuwonKorea
  2. 2.Department of Computer Education Teachers CollegeJeju National UniversityJeju-siKorea

Personalised recommendations