Abstract

Remote user authentication, in which the resources are distributed among the recipients and they are shared across the network in the form of network services provided by the remote systems. Before supply such services, the remote system should have the skill to authenticate the users. Otherwise, a discount could impersonate a legitimate user login to get access to the system. Currently, an efficient remote authentication in which using smart card have been widely adopted due to their low computational cost and convenient portability for the authentication purpose. In smart card this field, there are many studies have relied upon them, including a study by Khan et al. who claimed that he exceeded the weaknesses of Wang et al.'s scheme. But unfortunately Khan et al.'s scheme is still suffer from several the identified weaknesses which is include preserve anonymity of a user, efficiency for wrong password login, forward secrecy and efficiency session key agreement. So our propose which it includes the construction of authentication system depending on 2FA , which is authentication scheme based on smart card, where it is surpassed the identified weaknesses of Khan et al.'s scheme which including preserve anonymity of a user, efficiency for wrong password login, forward secrecy and efficiency session key agreement.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call