An Improvement of Sood, et al. 's Authentication Scheme using Smart Card

被引:0
|
作者
Shin, Kwang Cheul [1 ]
Cho, Jung Gil [2 ]
机构
[1] Sungkyul Univ, Div Ind Management Engn, Anyang, Gyeonggi Do 430742, South Korea
[2] Sungkyul Univ, Div Comp Sci Engn, 147-2,Anyang 8 Dong, Anyang, Gyeonggi Do 430742, South Korea
关键词
Authentication; Smart Card; Forgery Attack; Anonymity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2004, Das, et al.'s proposed the dynamic ID-based remote user authentication scheme to protect the user's anonymity. However, in 2005, Chein, et al.'s and Liao, et al.'s demonstrated that Das, et al.'s scheme failed to protecting user's anonymity. In addition, they showed that it was susceptible to guessing attack, so that it might expose the password to the remote system. In 2006, Liou, et al.'s proposed a new scheme which aimed to resolve the security vulnerabilities of Das, et al's scheme such as mutual authentication and malicious server attacks. However, in 2010, Sood, et al.'s demonstrated that Liou, et al's scheme is susceptible to impersonal attack, malicious user attack, man in the middle attack and offline password guessing attack. To resolve those vulnerabilities, Sood, et al.'s proposed new scheme. However, as a result of analysis of the new scheme proposed by Sood, et al., it is still vulnerable to malicious legal user attack and various attacks such as forgery, insider and database. In this paper, we propose an improvement to the Sood, et al.'s scheme in order to resolve such problems.
引用
收藏
页码:271 / 281
页数:11
相关论文
共 50 条
  • [1] Smart-card-loss-attack and Improvement of Hsiang et al.'s Authentication Scheme
    Lee, Y. C.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2013, 11 : 597 - 603
  • [2] An Improvement of Liao et al.'s Authentication Scheme using Smart Cards
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 240 - 245
  • [3] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [4] Improvement of Chien et al.'s remote user authentication scheme using smart cards
    Lee, SW
    Kim, HS
    Yoo, KY
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) : 181 - 183
  • [5] Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    Kumari, Saru
    Gupta, Mridul K.
    Kumar, Manoj
    OPEN COMPUTER SCIENCE, 2012, 2 (01): : 60 - 75
  • [6] Further improvement of Manik et al.'s remote user authentication scheme using smart cards
    Oh, Jai-Boo
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2006 WORKSHOPS, PROCEEDINGS, 2006, 4331 : 57 - +
  • [7] Security improvement on Chien et al.'s remote user authentication scheme using smart cards
    Duan, Xiaoyi
    Liu, JianWei
    Zhang, Qishan
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1133 - 1135
  • [8] Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card
    Chen, Chin-Ling
    Deng, Yong-Yuan
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,
  • [9] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards
    Yoon, Eun-Jun
    Lee, Eun-Jung
    Yoo, Kee-Young
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +
  • [10] Security of Chien et al.'s remote user authentication scheme using smart cards
    Hsu, CL
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (03) : 167 - 169