Skip to main content
Top

2016 | OriginalPaper | Chapter

An Efficient Three Factor Based Remote User Authentication Protocol for Distributed Networks

Authors : Ashish Singh, Kakali Chatterjee

Published in: Computer Information Systems and Industrial Management

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In distributed networks, one major security drawback is to identify the legitimate remote users of a web service on the Internet. To eliminate this security problem, many researchers have been proposed smart card based remote user authentication for secure communication in wireless networks. The wireless networks mostly use password based protocols that are based on two factors-smart card and PIN. But, this type of authentication protocols are susceptible to password guessing attack, stolen verifier attack, replay attack etc. In this paper, we propose a three factor based mutual authentication protocol using smart card in distributed networks, which resists all possible attacks. This protocol is suitable for hand held devices due to the low computational and communicational cost.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)CrossRef Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)CrossRef
2.
go back to reference Banerjee, S., Dutta, M.P., Bhunia, C.T.: A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. In: Proceedings of the 8th International Conference on Security of Information and Networks, pp. 58–64. ACM, 8 September 2015 Banerjee, S., Dutta, M.P., Bhunia, C.T.: A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. In: Proceedings of the 8th International Conference on Security of Information and Networks, pp. 58–64. ACM, 8 September 2015
3.
go back to reference Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Netw. 12(6), 1498–1504 (2001)CrossRef Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Netw. 12(6), 1498–1504 (2001)CrossRef
4.
go back to reference Yoon, E.J., Yoo, K.Y.: Robust multi-server authentication scheme. In: Sixth IFIP International Conference on Network and Parallel Computing, NPC 2009, pp. 197–203. IEEE, 19 October 2009 Yoon, E.J., Yoo, K.Y.: Robust multi-server authentication scheme. In: Sixth IFIP International Conference on Network and Parallel Computing, NPC 2009, pp. 197–203. IEEE, 19 October 2009
5.
go back to reference Li, X., Xiong, Y., Ma, J., Wang, W.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763–769 (2012)CrossRef Li, X., Xiong, Y., Ma, J., Wang, W.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763–769 (2012)CrossRef
6.
go back to reference Chuang, M.C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 41(4), 1411–1418 (2014)CrossRef Chuang, M.C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 41(4), 1411–1418 (2014)CrossRef
7.
go back to reference Lee, J.H., Lee, D.H.: Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment. In: International Conference on Consumer Electronics, ICCE 2008. Digest of Technical Papers, pp. 1–2. IEEE, 9 January 2008 Lee, J.H., Lee, D.H.: Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment. In: International Conference on Consumer Electronics, ICCE 2008. Digest of Technical Papers, pp. 1–2. IEEE, 9 January 2008
8.
go back to reference Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3), 115–121 (2008)CrossRef Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3), 115–121 (2008)CrossRef
9.
go back to reference Xie, Q., Chen, D.: Hash function and smart card based multi-server authentication protocol. In: 2010 WASE International Conference on Information Engineering, vol. 4, pp. 17–19 (2010) Xie, Q., Chen, D.: Hash function and smart card based multi-server authentication protocol. In: 2010 WASE International Conference on Information Engineering, vol. 4, pp. 17–19 (2010)
10.
go back to reference Zhu, H., Liu, T., Liu, J.: Robust and simple multi-server authentication protocol without verification table. In: 2009 Ninth International Conference on Hybrid Intelligent Systems, pp. 51–56. IEEE, 12 August 2009 Zhu, H., Liu, T., Liu, J.: Robust and simple multi-server authentication protocol without verification table. In: 2009 Ninth International Conference on Hybrid Intelligent Systems, pp. 51–56. IEEE, 12 August 2009
11.
go back to reference Chen, T.Y., Hwang, M.S., Lee, C.C., Jan, J.K.: Cryptanalysis of a secure dynamic ID based remote user authentication scheme for multi-server environment. In: 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), pp. 725–728. IEEE, 7 December 2009 Chen, T.Y., Hwang, M.S., Lee, C.C., Jan, J.K.: Cryptanalysis of a secure dynamic ID based remote user authentication scheme for multi-server environment. In: 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), pp. 725–728. IEEE, 7 December 2009
12.
go back to reference Shao, M.H., Chin, Y.C.: A novel dynamic ID-based remote user authentication and access control scheme for multi-server environment. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 1102–1107. IEEE, 29 June 2010 Shao, M.H., Chin, Y.C.: A novel dynamic ID-based remote user authentication and access control scheme for multi-server environment. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 1102–1107. IEEE, 29 June 2010
13.
go back to reference Chen, Y., Huang, C.H., Chou, J.S.: A novel multi-server authentication protocol. IACR Cryptol. ePrint Arch. 2009, 176 (2009) Chen, Y., Huang, C.H., Chou, J.S.: A novel multi-server authentication protocol. IACR Cryptol. ePrint Arch. 2009, 176 (2009)
14.
go back to reference Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629–631 (2004)CrossRef Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629–631 (2004)CrossRef
15.
go back to reference Kalra, S., Sood, S.: Advanced remote user authentication protocol for multi-server architecture based on ECC. J. Inf. Secur. Appl. 18(2), 98–107 (2013) Kalra, S., Sood, S.: Advanced remote user authentication protocol for multi-server architecture based on ECC. J. Inf. Secur. Appl. 18(2), 98–107 (2013)
16.
go back to reference Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces. 31(6), 1118–1123 (2009)CrossRef Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces. 31(6), 1118–1123 (2009)CrossRef
17.
go back to reference Xue, K., Hong, P., Ma, C.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195–206 (2014)MathSciNetCrossRef Xue, K., Hong, P., Ma, C.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195–206 (2014)MathSciNetCrossRef
Metadata
Title
An Efficient Three Factor Based Remote User Authentication Protocol for Distributed Networks
Authors
Ashish Singh
Kakali Chatterjee
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-45378-1_59

Premium Partner