Security Enhancements of an Improved Timestamp-Based Remote User Authentication Scheme
Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2011, Awasthi et al. proposed an improved timestamp-based remote authentication scheme to remove the drawbacks of Shen et al.’s scheme. In this paper, we show that Awasthi et al.’s scheme is vulnerable to the user impersonation attack, the password guessing attack, the insider attack and does not provide mutual authentication. Also, we propose the enhanced scheme to overcome these security drawbacks, even if the secret information stored in the smart card is revealed. As a result of security analysis, the enhanced scheme is relatively more secure than the related scheme in terms of security.
KeywordsAuthentication Smart Card User Impersonation Attack Password Guessing Attack
Unable to display preview. Download preview PDF.
- 7.Bindu, C.S., Reddy, P.C.S., Satyanarayana, B.: Improved Remote User Authentication Scheme Preserving User Anonymity. International Journal of Computer Science and Network Security 8(3), 62–66 (2008)Google Scholar