Abstract

Remote user authentication schemes are used to verify the legitimacy of remote users’ login request. Recently, several dynamic user authentication schemes have been proposed. It can be seen that, these schemes have weaknesses because of using timestamps. The implement of strict and safe time synchronization is very difficult and increases network overhead. In this paper, we propose a new dynamic user authentication based on nonce. Mutual authentication is performed using a challenge-response handshake between user and server, and it avoids the problems of synchronism between smart card and the remote server. Besides, the scheme provides user’s anonymity and session key agreement. Finally, the security analysis and performance evaluation show that the scheme can resist several attacks, and our proposal is feasible in terms of computation cost and communication cost.

Highlights

  • With the large-scale proliferation of internet and network technologies, people are able to access any service from any place and at any time

  • Password-based authentication scheme suffers from attacks due to the low entropy password, designing a more secure and efficient authentication protocol is in urgent need

  • We proposed an enhanced dynamic ID-based remote user authentication scheme

Read more

Summary

Introduction

With the large-scale proliferation of internet and network technologies, people are able to access any service from any place and at any time. In 2004, Das et al [5] proposed a dynamic ID-based remote user authentication scheme, which can resist replay, masquerade, and insider attacks. Wang et al proposed a more efficient and secure dynamic ID-based remote user authentication scheme. Khan et al in 2011 [7] pointed out that Wang et al.’s scheme has insider attack and does not provide user’s anonymity and session key agreement. They proposed a dynamic ID based remote user authentication scheme. We proposed an enhanced dynamic ID-based remote user authentication scheme.

The Proposed Scheme
Registration Phase
Login Phase
Security Analysis
Password Guessing Attack
Parallel Session Attack
Performance Comparison
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call