Remote User Authentication Scheme with Hardware-Based Attestation

被引:0
|
作者
Nor, Fazli Bin Mat [1 ]
Jalil, Kamarularifin Abd [1 ]
Ab Manan, Jamalul-lail [2 ]
机构
[1] Univ Teknol Mara, Fac Comp & Math Sci, Shah Alam 40450, Selangor, Malaysia
[2] MIMOS Berhad, Kuala Lumpur 57000, Malaysia
关键词
remote user authentication; remote attestation; trusted platform module; privacy; pseudonym;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many previous works on remote user authentication schemes are related to remote services environment such as online banking and electronic commerce. However, these schemes are dependent solely on one parameter, namely, user legitimacy in order to fulfill the authentication process. Furthermore, most of the schemes rely on prearranged shared secret key or server secret key to generate session key in order to secure its communication. Consequently, these schemes are vulnerable to malicious software attacks that could compromise the integrity of the platform used for the communication. As a result, user identity or shared secret key potentially can be exposed due to limitation of the scheme in providing trust or evidence of claimed platform identity. In this paper, we propose a remote authentication with hardware based attestation and secure key exchange protocol to resist malicious software attack. In addition, we also propose pseudonym identity enhancement in order to improve user identity privacy.
引用
收藏
页码:437 / +
页数:3
相关论文
共 50 条
  • [21] A dynamic ID-based remote user authentication scheme
    Das, ML
    Saxena, A
    Gulati, VP
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 629 - 631
  • [22] An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
    Khan, Muhammad Khurram
    Kumari, Saru
    BIOMED RESEARCH INTERNATIONAL, 2013, 2013
  • [23] Efficient remote user authentication scheme based on generalized ElGamal signature scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 568 - 570
  • [24] Security for Building Automation with Hardware-Based Node Authentication
    Fischer, Thomas
    Lesjak, Christian
    Hoeller, Andrea
    Steger, Christian
    2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [25] A simplified scheme for hardware-based pattern recognition
    Henke, T
    Ginzel, T
    Lohweg, V
    2005 International Conference on Image Processing (ICIP), Vols 1-5, 2005, : 301 - 304
  • [26] A Survey on Attacks in Remote User Authentication Scheme
    Limbasiya, Trupil
    Doshi, Nishant
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1157 - 1160
  • [27] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
  • [28] Cryptanalysis and improvement of a remote user authentication scheme
    Ou Qingyu
    Huang Kai
    Li Guang
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
  • [29] A flexible biometrics remote user authentication scheme
    Lin, CH
    Lai, YY
    COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 19 - 23
  • [30] Further Improved Remote User Authentication Scheme
    Kim, Jung-Yoon
    Choi, Hyoung-Kee
    Copeland, John A.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1426 - 1433