Remote User Authentication Scheme with Hardware-Based Attestation

被引:0
|
作者
Nor, Fazli Bin Mat [1 ]
Jalil, Kamarularifin Abd [1 ]
Ab Manan, Jamalul-lail [2 ]
机构
[1] Univ Teknol Mara, Fac Comp & Math Sci, Shah Alam 40450, Selangor, Malaysia
[2] MIMOS Berhad, Kuala Lumpur 57000, Malaysia
关键词
remote user authentication; remote attestation; trusted platform module; privacy; pseudonym;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many previous works on remote user authentication schemes are related to remote services environment such as online banking and electronic commerce. However, these schemes are dependent solely on one parameter, namely, user legitimacy in order to fulfill the authentication process. Furthermore, most of the schemes rely on prearranged shared secret key or server secret key to generate session key in order to secure its communication. Consequently, these schemes are vulnerable to malicious software attacks that could compromise the integrity of the platform used for the communication. As a result, user identity or shared secret key potentially can be exposed due to limitation of the scheme in providing trust or evidence of claimed platform identity. In this paper, we propose a remote authentication with hardware based attestation and secure key exchange protocol to resist malicious software attack. In addition, we also propose pseudonym identity enhancement in order to improve user identity privacy.
引用
收藏
页码:437 / +
页数:3
相关论文
共 50 条
  • [41] A Novel Dynamic ID-Based Remote User Authentication Scheme
    Misbahuddin, Md.
    Ahmed, Md. Aijaz
    Rao, A. Ananda
    Bindu, C. Shoba
    Khan, M. A. Muqsit
    2006 ANNUAL IEEE INDIA CONFERENCE, 2006, : 364 - +
  • [42] A lightweight biometrics based remote user authentication scheme for IoT services
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 : 255 - 270
  • [43] Cryptanalysis of "An Improved Timestamp-Based Remote User Authentication Scheme"
    Kumari, Saru
    Gupta, Mridul K.
    Khan, Muhammad Khurram
    Bin Muhaya, Fahad T.
    2012 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2012, : 1439 - 1442
  • [44] Improvement on the dynamic ID-based remote user authentication scheme
    Lee, Yung-Cheng
    Chang, Geeng-Kwei
    Kuo, Wen-Chung
    Chu, Jung-Lu
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3283 - +
  • [45] Security Analysis on a Timestamp-based Remote User Authentication Scheme
    Tan, Zuowen
    Wang, Jianfeng
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2838 - 2843
  • [46] A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION
    Cheng, Zi-Yao
    Liu, Yun
    Chang, Chin-Chen
    Chang, Shih-Chang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (08): : 5499 - 5511
  • [47] A secure and efficient scheme of remote user authentication based on bilinear pairings
    Liao, Yi-Pin
    Wang, Shuenn-Shyang
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 920 - +
  • [48] Smart Card Based Remote User Authentication Scheme for Cloud Computing
    Madhusudhan, R.
    Hegde, Manjunath
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 905 - 910
  • [49] CARA: Cellular Automata based Remote-user Authentication scheme
    Tripathy, Somanath
    Chowdhury, Atanu Roy
    Nandi, Sukumar
    2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 67 - +
  • [50] Cryptanalysis of a Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme
    Quan, Chunyi
    Jung, Jaewook
    Lee, Hakjun
    Kang, Dongwoo
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 438 - 441