Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

July Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the July 2021 Edition of the journal. The last date of research paper submission is June 15, 2021.

An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card

Ram Ratan Ahirwal , Swarn Sanjay Sonwanshi Published in Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
10.5120/ijais12-450188
Download full text
  1. Ram Ratan Ahirwal and Swarn Sanjay Sonwanshi. Article: An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card. International Journal of Applied Information Systems 1(6):35-41, February 2012. BibTeX

    @article{key:article,
    	author = "Ram Ratan Ahirwal and Swarn Sanjay Sonwanshi",
    	title = "Article: An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 1,
    	number = 6,
    	pages = "35-41",
    	month = "February",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

The User Authentication mechanism technology has enjoyed strong growth in recent year, but security threats and facing attacks in authentication have grown equally fast. Today, there are many potential attacks that are targeted at authentication including insider attack, masquerade attack, server spoofing attack, parallel session attack, offline password guessing attack and many more. Recently, In 2010 R. Song proposed advanced smart card based password authentication protocol with such non-tamper resistant smart card based on symmetric key cryptosystem as well as modular exponentiation. R. Song et al Scheme is vulnerable to the offline password attack, insider attack; forward secrecy and denial of service attack are cryptanalyses by W B Horng. In this article, we will propose an efficient ID-based authentication scheme which can avoid all type of security flaws. The functionally, performance and security analysis show that our proposed scheme is feasible in terms of computation cost, storage capacity and the scheme can resist server attack.

Reference

  1. L. Lamport, 1981 “Password authentication with insecure communication”. Communications of the ACM, vol.24, no.11, , pp 770-772
  2. M. S. Hwang and L. H. Li. 2000 “A new remote user authentication scheme using smart card”, In IEEE Transaction on consumer Eleclronic,”vol.40, no 1, pp 28-30,
  3. E. Yoon and Yoo, 2005 “More efficient and secure remote user authentication scheme using smart card”, in proceeding of 11th international conference on Parallel and Distributed System, pp.73-77
  4. M.L. Das, A. Saxena and V.P. Gulati, 2004 “A Dynamic ID-based remote user authentication scheme”, IEEE Transaction on consumer Eleectronice, vol. 50, pp. 629-631
  5. H.Y. Chien and C.H. Chen, 2005”A remote authentication scheme preserving user anonymity,” proc. advanced information networking and application, vol.2.pp 245-248, march.
  6. I.E. Liao, Chenge-chi Lee and Min-shiang Hwang, 2005 “Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme," Proc. Conference on Next Generation Web Services Practice, pp.437-440, July.
  7. Y.P. Liou, J. Lin and S.S. Wang, 2006 “A New Dynamic ID Based Remote User Authentication Scheme using Smart Cards,” Proc. 16th Information Security Conference, Taiwan, pp. 198-205, July.
  8. L.I.Hu, X.X. Niu, and Y.X. Yang, 2007 “Weaknesses and improvements of a remote user authentication scheme using smart cards”, The Journal of China Universities of Posts and Telecommunications, vol. 14, pp. 91-94.
  9. J. Xu, W.T. Zhu and D.G. Feng, 2009 “An improved smart card based password authentication scheme with provable security”, Computer Standards & Interfaces, vol. 31, no. 4, pp. 723 – 728.
  10. R. Song. 2010 “Advanced smart card based password authentication Protocol”. Computer Standards & Interfaces, Volume 32, Issue 4, June, Pages 321-325.
  11. Sandeep K. Sood, Anil K.Sarje and Kuldip Singh, 2010 "Secure dynamic identity-based remote user authentication scheme", Distributed Computing and Internet Technology, Lecture Notes in Computer Science, vol. 5966, pp. 224-235.
  12. W B Horng and Cheng p Lee, 2010 “Security weaknesses of song’s advanced smart card based Password authentication Protocol.”IEEE trans. Computer, vol.978-4244-6789 1/10,
  13. R S Pippal, Jaindhar C D, 2010“Comments on Symmetric Key Encryption based smart card authentication scheme”. ICCTD 2010 IEEE vol. 978-1-4244-8845-2/10/2010
  14. William Stallings, “Cryptography and Network Security”, 4/E. Prentice Hall.
  15. Chun-Ta Li and Cheng-Chi Lee, 2011 “a robust remote user authentication scheme using smart card,” Information Technology and Control, Vol.40, No.3 ,
  16. Z. Jia, Y. Zhang, H. Shao, Y. Lin and J. Wang 2006, “A remote user authentication scheme using bilinear pairings and ECC”, Proceeding Of 6th International Conference on Intelligent Systems Design and Applications (ISDA’06), Vol.2, Oct., pp. 1091-1094.
  17. Eun-Jun Yoon, and Kee-Young Yoo, 2011, “Three Attacks on Jia et al.’s Remote User Authentication Scheme using Bilinear Pairings and ECC”, World Academy of Science, Engineering and Technology 60 (JULY 2011).

Keywords

Password authentication, smart card, network security, one-way hash function