EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 6

An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card

journal image
 Download
2027
  • Ram Ratan Ahirwal and Swarn Sanjay Sonwanshi 2012. An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card. International Journal of Applied Information Systems. 1, 6 (February 2012), 35-41. DOI=http://dx.doi.org/10.5120/ijais450188
  • @article{10.5120/ijais2017451568,
    author = {Ram Ratan Ahirwal  and Swarn Sanjay Sonwanshi},
    title = {An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card},
    journal = {International Journal of Applied Information Systems},
    issue_date = {February 2012},
    volume = {1},
    number = {},
    month = {February},
    year = {2012},
    issn = {},
    pages = {35-41},
    numpages = {},
    url = {/archives/volume1/number6/100-0188},
    doi = { 10.5120/ijais12-450188},
    publisher = { xA9 2010 by IJAIS Journal},
    address = {}
    }
    
  • %1 450188
    %A Ram Ratan Ahirwal 
    %A Swarn Sanjay Sonwanshi
    %T An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card
    %J International Journal of Applied Information Systems
    %@ 
    %V 1
    %N 
    %P 35-41
    %D 2012
    %I  xA9 2010 by IJAIS Journal
    

Abstract

The User Authentication mechanism technology has enjoyed strong growth in recent year, but security threats and facing attacks in authentication have grown equally fast. Today, there are many potential attacks that are targeted at authentication including insider attack, masquerade attack, server spoofing attack, parallel session attack, offline password guessing attack and many more. Recently, In 2010 R. Song proposed advanced smart card based password authentication protocol with such non-tamper resistant smart card based on symmetric key cryptosystem as well as modular exponentiation. R. Song et al Scheme is vulnerable to the offline password attack, insider attack; forward secrecy and denial of service attack are cryptanalyses by W B Horng. In this article, we will propose an efficient ID-based authentication scheme which can avoid all type of security flaws. The functionally, performance and security analysis show that our proposed scheme is feasible in terms of computation cost, storage capacity and the scheme can resist server attack.

References

  1. L. Lamport, 1981 “Password authentication with insecure communication”. Communications of the ACM, vol.24, no.11, , pp 770-772
  2. M. S. Hwang and L. H. Li. 2000 “A new remote user authentication scheme using smart card”, In IEEE Transaction on consumer Eleclronic,”vol.40, no 1, pp 28-30,
  3. E. Yoon and Yoo, 2005 “More efficient and secure remote user authentication scheme using smart card”, in proceeding of 11th international conference on Parallel and Distributed System, pp.73-77
  4. M.L. Das, A. Saxena and V.P. Gulati, 2004 “A Dynamic ID-based remote user authentication scheme”, IEEE Transaction on consumer Eleectronice, vol. 50, pp. 629-631
  5. H.Y. Chien and C.H. Chen, 2005”A remote authentication scheme preserving user anonymity,” proc. advanced information networking and application, vol.2.pp 245-248, march.
  6. I.E. Liao, Chenge-chi Lee and Min-shiang Hwang, 2005 “Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme," Proc. Conference on Next Generation Web Services Practice, pp.437-440, July.
  7. Y.P. Liou, J. Lin and S.S. Wang, 2006 “A New Dynamic ID Based Remote User Authentication Scheme using Smart Cards,” Proc. 16th Information Security Conference, Taiwan, pp. 198-205, July.
  8. L.I.Hu, X.X. Niu, and Y.X. Yang, 2007 “Weaknesses and improvements of a remote user authentication scheme using smart cards”, The Journal of China Universities of Posts and Telecommunications, vol. 14, pp. 91-94.
  9. J. Xu, W.T. Zhu and D.G. Feng, 2009 “An improved smart card based password authentication scheme with provable security”, Computer Standards & Interfaces, vol. 31, no. 4, pp. 723 – 728.
  10. R. Song. 2010 “Advanced smart card based password authentication Protocol”. Computer Standards & Interfaces, Volume 32, Issue 4, June, Pages 321-325.
  11. Sandeep K. Sood, Anil K.Sarje and Kuldip Singh, 2010 "Secure dynamic identity-based remote user authentication scheme", Distributed Computing and Internet Technology, Lecture Notes in Computer Science, vol. 5966, pp. 224-235.
  12. W B Horng and Cheng p Lee, 2010 “Security weaknesses of song’s advanced smart card based Password authentication Protocol.”IEEE trans. Computer, vol.978-4244-6789 1/10,
  13. R S Pippal, Jaindhar C D, 2010“Comments on Symmetric Key Encryption based smart card authentication scheme”. ICCTD 2010 IEEE vol. 978-1-4244-8845-2/10/2010
  14. William Stallings, “Cryptography and Network Security”, 4/E. Prentice Hall.
  15. Chun-Ta Li and Cheng-Chi Lee, 2011 “a robust remote user authentication scheme using smart card,” Information Technology and Control, Vol.40, No.3 ,
  16. Z. Jia, Y. Zhang, H. Shao, Y. Lin and J. Wang 2006, “A remote user authentication scheme using bilinear pairings and ECC”, Proceeding Of 6th International Conference on Intelligent Systems Design and Applications (ISDA’06), Vol.2, Oct., pp. 1091-1094.
  17. Eun-Jun Yoon, and Kee-Young Yoo, 2011, “Three Attacks on Jia et al.’s Remote User Authentication Scheme using Bilinear Pairings and ECC”, World Academy of Science, Engineering and Technology 60 (JULY 2011).

Keywords

Password authentication, smart card, network security, one-way hash function

Index Terms

Computer Science
Information Sciences