Skip to main content

2012 | OriginalPaper | Buchkapitel

Security Weakness of a Dynamic ID-Based User Authentication Scheme with Key Agreement

verfasst von : Mijin Kim, Namje Park, Dongho Won

Erschienen in: Computer Science and its Applications

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A remote user authentication scheme is a method to confirm the identity of a remote individual login to the server over an untrusted, public network. In 2012, Wen-Li proposed a dynamic ID-based user authentication scheme with key agreement and claimed that their scheme resisted impersonation attack and avoided leakage of partial information However, we find out that Wen-Li’s scheme could leak some key information to an adversary and is exposed to man in the middle attack launched by any adversary. In this paper we conduct detailed analysis of flaws in Wen-Li’s scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Das, M.L., Saxana, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629–631 (2004)CrossRef Das, M.L., Saxana, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629–631 (2004)CrossRef
2.
Zurück zum Zitat Awasthi, A.K.: Comment on a dynamic ID-based remote user authentication scheme. Trans. Cryptol. 1(2), 15–16 (2004)MathSciNet Awasthi, A.K.: Comment on a dynamic ID-based remote user authentication scheme. Trans. Cryptol. 1(2), 15–16 (2004)MathSciNet
3.
Zurück zum Zitat Ku, W.C., Chang, S.T.: Impersonation attacks on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Trans. 5, 2165–2167 (2005) Ku, W.C., Chang, S.T.: Impersonation attacks on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Trans. 5, 2165–2167 (2005)
4.
Zurück zum Zitat Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4), 583–585 (2009)CrossRef Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4), 583–585 (2009)CrossRef
5.
Zurück zum Zitat Juang, W.S., Wu, J.L.: Two efficient two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 35(1), 33–40 (2009)MATHCrossRef Juang, W.S., Wu, J.L.: Two efficient two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 35(1), 33–40 (2009)MATHCrossRef
6.
Zurück zum Zitat Lee, Y., Kim, S., Won, D.: Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 36(1), 213–223 (2010)MATHCrossRef Lee, Y., Kim, S., Won, D.: Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 36(1), 213–223 (2010)MATHCrossRef
7.
Zurück zum Zitat Wen, F., Li, X.: An improved dynamic ID based remote user authentication scheme with key agreement scheme. Comput. Electr. Eng. 38(2), 381–387 (2012)MathSciNetCrossRef Wen, F., Li, X.: An improved dynamic ID based remote user authentication scheme with key agreement scheme. Comput. Electr. Eng. 38(2), 381–387 (2012)MathSciNetCrossRef
8.
Zurück zum Zitat Tsaur, W., Li, J., Lee, W.: An efficient and secure multi-server authentication scheme with key agreement. J. Syst. Softw. 85(4), 876–882 (2012)CrossRef Tsaur, W., Li, J., Lee, W.: An efficient and secure multi-server authentication scheme with key agreement. J. Syst. Softw. 85(4), 876–882 (2012)CrossRef
9.
Zurück zum Zitat Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006, LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006) Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006, LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
10.
Zurück zum Zitat Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010, CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010) Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010, CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)
11.
Zurück zum Zitat Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI 2011, LNCS. Springer, Heidelberg (2011) Park, N.: Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI 2011, LNCS. Springer, Heidelberg (2011)
12.
Zurück zum Zitat Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad HocUbiquitous Comput, 8(4), 205–219 (2011) Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad HocUbiquitous Comput, 8(4), 205–219 (2011)
13.
Zurück zum Zitat Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010) Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)
14.
Zurück zum Zitat Lv, C., Ma, M., Li, H., Ma, J., Zhang, Y.: An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. (available online, 2012) Lv, C., Ma, M., Li, H., Ma, J., Zhang, Y.: An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. (available online, 2012)
Metadaten
Titel
Security Weakness of a Dynamic ID-Based User Authentication Scheme with Key Agreement
verfasst von
Mijin Kim
Namje Park
Dongho Won
Copyright-Jahr
2012
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-5699-1_69