Skip to main content
Erschienen in: Wireless Personal Communications 1/2015

01.11.2015

An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography

verfasst von: Baojun Huang, Muhammad Khurram Khan, Libing Wu, Fahad T. Bin Muhaya, Debiao He

Erschienen in: Wireless Personal Communications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As the internet technology’s evolution, identity authentication in the network is becoming more and more significant. In 2014, Qu et al. proposed a two-factor remote mutual authentication and key agreement scheme. They pointed out that their scheme could withstand smart card loss attack, offline password guessing attack, impersonation attack and so on. However, based on our analysis, it shows that the scheme suffers from offline password guessing attack and impersonation attack. Moreover, their scheme could not achieve perfect user anonymity. In this paper, we propose a scheme, which can withstand those attacks mentioned above. After the function and efficiency comparison with other schemes, our scheme is much more secure and practical as the secure universal access control mechanism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24, 770–772.CrossRef Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24, 770–772.CrossRef
2.
Zurück zum Zitat Peyravian, M. (2000). Methods for protecting password transmission. Computers & Security, 19(5), 466–469.CrossRef Peyravian, M. (2000). Methods for protecting password transmission. Computers & Security, 19(5), 466–469.CrossRef
3.
Zurück zum Zitat Lin, C. (2003). A password authentication scheme with secure password updating. Computers & Security, 22(1), 68–72.CrossRef Lin, C. (2003). A password authentication scheme with secure password updating. Computers & Security, 22(1), 68–72.CrossRef
4.
Zurück zum Zitat Juang, W., Chen, S., & Liaw, H. (2008). Robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 55(6), 2551–2556.CrossRef Juang, W., Chen, S., & Liaw, H. (2008). Robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 55(6), 2551–2556.CrossRef
5.
Zurück zum Zitat Yang, G., et al. (2008). Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160–1172.MATHMathSciNetCrossRef Yang, G., et al. (2008). Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160–1172.MATHMathSciNetCrossRef
6.
Zurück zum Zitat Liao, C., Chen, H., & Wang, C. (2009). An exquisite mutual authentication scheme with key agreement using smart card. Informatica, 33(2), 117.MATHMathSciNet Liao, C., Chen, H., & Wang, C. (2009). An exquisite mutual authentication scheme with key agreement using smart card. Informatica, 33(2), 117.MATHMathSciNet
7.
Zurück zum Zitat Xu, J., Zhu, W., & Feng, D. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces, 31(4), 723–728.CrossRef Xu, J., Zhu, W., & Feng, D. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces, 31(4), 723–728.CrossRef
8.
Zurück zum Zitat Yeh, K., et al. (2010). Two robust remote user authentication protocols using smart cards. Journal of Systems and Software, 83(12), 2556–2565.CrossRef Yeh, K., et al. (2010). Two robust remote user authentication protocols using smart cards. Journal of Systems and Software, 83(12), 2556–2565.CrossRef
9.
Zurück zum Zitat Wang, D. et al. (2014) Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, 1–1. Wang, D. et al. (2014) Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, 1–1.
10.
Zurück zum Zitat Huang, X., et al. (2014). Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1767–1775.CrossRef Huang, X., et al. (2014). Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1767–1775.CrossRef
11.
Zurück zum Zitat Wang, D., & Wang, P. (2014). On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks, 73, 41–57.CrossRef Wang, D., & Wang, P. (2014). On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks, 73, 41–57.CrossRef
12.
Zurück zum Zitat He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences,. doi:10.1016/j.ins.2015.02.010. He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences,. doi:10.​1016/​j.​ins.​2015.​02.​010.
13.
Zurück zum Zitat Wang, D., & Wang, P. (2014). Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks, 20, 1–15.CrossRef Wang, D., & Wang, P. (2014). Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks, 20, 1–15.CrossRef
14.
Zurück zum Zitat He, D. (2015). Zeadally. Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1): 71–77. He, D. (2015). Zeadally. Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1): 71–77.
15.
Zurück zum Zitat He, D., et al. (2014). Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60(1), 30–37.CrossRef He, D., et al. (2014). Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60(1), 30–37.CrossRef
17.
Zurück zum Zitat Lee, S., Kim, H., & Yoo, K. (2005). Improvement of Chien et al’.s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 27(2), 181–183.CrossRef Lee, S., Kim, H., & Yoo, K. (2005). Improvement of Chien et al’.s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 27(2), 181–183.CrossRef
18.
Zurück zum Zitat Lee, N., & Chiu, Y. (2005). Improved remote authentication scheme with smart card. Computer Standards & Interfaces, 27(2), 177–180.CrossRef Lee, N., & Chiu, Y. (2005). Improved remote authentication scheme with smart card. Computer Standards & Interfaces, 27(2), 177–180.CrossRef
19.
Zurück zum Zitat Sood, S., Sarje, A., & Singh, K. (2010). An improvement of Xu et al.'s authentication scheme using smart cards, COMPUTE, COMPUTE^Editors. ACM. p. 1–5. Sood, S., Sarje, A., & Singh, K. (2010). An improvement of Xu et al.'s authentication scheme using smart cards, COMPUTE, COMPUTE^Editors. ACM. p. 1–5.
20.
Zurück zum Zitat Song, R. (2010). Advanced smart card based password authentication protocol. Computer Standards & Interfaces, 32(5–6), 321–325.CrossRef Song, R. (2010). Advanced smart card based password authentication protocol. Computer Standards & Interfaces, 32(5–6), 321–325.CrossRef
21.
Zurück zum Zitat Chen, B., Kuo, W., & Wuu, L. (2014). Robust smart-card-based remote user password authentication scheme. International Journal of Communication Systems, 27(2), 377–389.CrossRef Chen, B., Kuo, W., & Wuu, L. (2014). Robust smart-card-based remote user password authentication scheme. International Journal of Communication Systems, 27(2), 377–389.CrossRef
22.
Zurück zum Zitat Jiang, Q., & Ma, J. (2013). An improved password-based remote user authentication protocol without smart cards. Information technology And control, 42(2), 150–158.CrossRef Jiang, Q., & Ma, J. (2013). An improved password-based remote user authentication protocol without smart cards. Information technology And control, 42(2), 150–158.CrossRef
23.
Zurück zum Zitat Qu, J., & Tan, X. (2014). Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem. Journal of Electrical and Computer Engineering, 2014, 1–6.CrossRef Qu, J., & Tan, X. (2014). Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem. Journal of Electrical and Computer Engineering, 2014, 1–6.CrossRef
24.
Zurück zum Zitat Yang, J., & Chang, C. (2009). An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security, 28(3–4), 138–143.CrossRef Yang, J., & Chang, C. (2009). An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security, 28(3–4), 138–143.CrossRef
25.
Zurück zum Zitat Islam, S., & Biswas, G. (2011). A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software, 84(11), 1892–1898.CrossRef Islam, S., & Biswas, G. (2011). A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software, 84(11), 1892–1898.CrossRef
Metadaten
Titel
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
verfasst von
Baojun Huang
Muhammad Khurram Khan
Libing Wu
Fahad T. Bin Muhaya
Debiao He
Publikationsdatum
01.11.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2735-1

Weitere Artikel der Ausgabe 1/2015

Wireless Personal Communications 1/2015 Zur Ausgabe

Neuer Inhalt