CFP last date
15 April 2024
Reseach Article

An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card

by Ram Ratan Ahirwal, Swarn Sanjay Sonwanshi
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 6
Year of Publication: 2012
Authors: Ram Ratan Ahirwal, Swarn Sanjay Sonwanshi
10.5120/ijais12-450188

Ram Ratan Ahirwal, Swarn Sanjay Sonwanshi . An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card. International Journal of Applied Information Systems. 1, 6 ( February 2012), 35-41. DOI=10.5120/ijais12-450188

@article{ 10.5120/ijais12-450188,
author = { Ram Ratan Ahirwal, Swarn Sanjay Sonwanshi },
title = { An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card },
journal = { International Journal of Applied Information Systems },
issue_date = { February 2012 },
volume = { 1 },
number = { 6 },
month = { February },
year = { 2012 },
issn = { 2249-0868 },
pages = { 35-41 },
numpages = {9},
url = { https://www.ijais.org/archives/volume1/number6/100-0188/ },
doi = { 10.5120/ijais12-450188 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:41:39.964052+05:30
%A Ram Ratan Ahirwal
%A Swarn Sanjay Sonwanshi
%T An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 1
%N 6
%P 35-41
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The User Authentication mechanism technology has enjoyed strong growth in recent year, but security threats and facing attacks in authentication have grown equally fast. Today, there are many potential attacks that are targeted at authentication including insider attack, masquerade attack, server spoofing attack, parallel session attack, offline password guessing attack and many more. Recently, In 2010 R. Song proposed advanced smart card based password authentication protocol with such non-tamper resistant smart card based on symmetric key cryptosystem as well as modular exponentiation. R. Song et al Scheme is vulnerable to the offline password attack, insider attack; forward secrecy and denial of service attack are cryptanalyses by W B Horng. In this article, we will propose an efficient ID-based authentication scheme which can avoid all type of security flaws. The functionally, performance and security analysis show that our proposed scheme is feasible in terms of computation cost, storage capacity and the scheme can resist server attack.

References
  1. L. Lamport, 1981 “Password authentication with insecure communication”. Communications of the ACM, vol.24, no.11, , pp 770-772
  2. M. S. Hwang and L. H. Li. 2000 “A new remote user authentication scheme using smart card”, In IEEE Transaction on consumer Eleclronic,”vol.40, no 1, pp 28-30,
  3. E. Yoon and Yoo, 2005 “More efficient and secure remote user authentication scheme using smart card”, in proceeding of 11th international conference on Parallel and Distributed System, pp.73-77
  4. M.L. Das, A. Saxena and V.P. Gulati, 2004 “A Dynamic ID-based remote user authentication scheme”, IEEE Transaction on consumer Eleectronice, vol. 50, pp. 629-631
  5. H.Y. Chien and C.H. Chen, 2005”A remote authentication scheme preserving user anonymity,” proc. advanced information networking and application, vol.2.pp 245-248, march.
  6. I.E. Liao, Chenge-chi Lee and Min-shiang Hwang, 2005 “Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme," Proc. Conference on Next Generation Web Services Practice, pp.437-440, July.
  7. Y.P. Liou, J. Lin and S.S. Wang, 2006 “A New Dynamic ID Based Remote User Authentication Scheme using Smart Cards,” Proc. 16th Information Security Conference, Taiwan, pp. 198-205, July.
  8. L.I.Hu, X.X. Niu, and Y.X. Yang, 2007 “Weaknesses and improvements of a remote user authentication scheme using smart cards”, The Journal of China Universities of Posts and Telecommunications, vol. 14, pp. 91-94.
  9. J. Xu, W.T. Zhu and D.G. Feng, 2009 “An improved smart card based password authentication scheme with provable security”, Computer Standards & Interfaces, vol. 31, no. 4, pp. 723 – 728.
  10. R. Song. 2010 “Advanced smart card based password authentication Protocol”. Computer Standards & Interfaces, Volume 32, Issue 4, June, Pages 321-325.
  11. Sandeep K. Sood, Anil K.Sarje and Kuldip Singh, 2010 "Secure dynamic identity-based remote user authentication scheme", Distributed Computing and Internet Technology, Lecture Notes in Computer Science, vol. 5966, pp. 224-235.
  12. W B Horng and Cheng p Lee, 2010 “Security weaknesses of song’s advanced smart card based Password authentication Protocol.”IEEE trans. Computer, vol.978-4244-6789 1/10,
  13. R S Pippal, Jaindhar C D, 2010“Comments on Symmetric Key Encryption based smart card authentication scheme”. ICCTD 2010 IEEE vol. 978-1-4244-8845-2/10/2010
  14. William Stallings, “Cryptography and Network Security”, 4/E. Prentice Hall.
  15. Chun-Ta Li and Cheng-Chi Lee, 2011 “a robust remote user authentication scheme using smart card,” Information Technology and Control, Vol.40, No.3 ,
  16. Z. Jia, Y. Zhang, H. Shao, Y. Lin and J. Wang 2006, “A remote user authentication scheme using bilinear pairings and ECC”, Proceeding Of 6th International Conference on Intelligent Systems Design and Applications (ISDA’06), Vol.2, Oct., pp. 1091-1094.
Index Terms

Computer Science
Information Sciences

Keywords

Password authentication smart card network security one-way hash function