Call for Paper - August 2020 Edition
IJCA solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 20, 2020. Read More

A Secure Dynamic Authentication Scheme for Smart Card based Networks

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 8 - Article 2
Year of Publication: 2010
Authors:
Dr. S. Santhosh Baboo
K. Gokulraj
10.5120/1605-2157

Dr. Santhosh S Baboo and K Gokulraj. Article:A Secure Dynamic Authentication Scheme for Smart Card based Networks. International Journal of Computer Applications 11(8):5–12, December 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Dr. S. Santhosh Baboo and K. Gokulraj},
	title = {Article:A Secure Dynamic Authentication Scheme for Smart Card based Networks},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {11},
	number = {8},
	pages = {5--12},
	month = {December},
	note = {Published By Foundation of Computer Science}
}

Abstract

Authentication is one of the essential security features in network communication. Authentication process ascertains the legitimacy of the communicating partners in communication. In authentication process, the originator of the communication and the respondent transacts some identification codes of each other prior to start of the message transaction. Several methods have been proposed regarding the authentication process from time to time. Here, we introduce a new authentication scheme based on dynamicity which is relatively a different approach to ensure and enhance the smart card based remote authentication and security. This method discusses about the authentication for smart card based network systems. This method introduces a dynamic authentication scheme which includes number of factors, among them the password, password index, and date of modification are important factors which decides the dynamicity. The static approach authentication schemes are vulnerable to different types of attacks. In order to overcome the threats of the existing approaches, the dynamic authentication scheme is introduced. This scheme ensures the authentication, confidentiality, reliability, integrity and security. The security analysis of this method shows that this scheme is sustainable to the vulnerability attacks during authentication process and provides more security features in networked communications using smart cards.

Reference

  • L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol.24, pp. 770-772, Nov. 1981.
  • C. C. Chang and W. Y. Liao, “A remote password authentication scheme based upon ElGamal’s signature scheme,” Computer &Security, vol. 13, no. 2, pp. 137-144, 1994.
  • W. H. Yang and S. P. Shieh, “Password authentication schemes with smart cards,” Computers & Security , vol. 18, no. 8, pp. 727-733, 1999.
  • M. S. Hwang, and L. H. Li, “A new remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp 28-30, Feb. 2000.
  • C. K. Chan and L. M. Cheng, “Cryptanalysis of a remote user authentication scheme using Smart cards,” IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 992-993, Nov.2000.
  • T. S. Messerges, E. A. Dabbish, and .H. Sloan, “Examining smart card security under the threat of power analysis attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
  • A. K. Awasthi and S. Lal, “A remote user authentication scheme using smarts cards with forward secrecy", IEEE Transactions on Consumer Electronic, vol. 49, no. 4, pp.1246-1248, 2003.
  • J. J. Shen, C. W. Lin, and M. S. Hwang, “A modified remote user authentication Scheme using smart cards”, IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, May 2003.
  • K. C. Leung, L. M. Cheng, Anthony S. Fong, and C. K. Chan, “Cryptanalysis of a modified remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 49, no. 4, pp. 1243-1245, Nov. 2003.
  • K. Manoj, “New remote user authentication scheme with smart cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 597-600, 2004.
  • E. J. Yoon, E. K. Ryu, and K. Y. Yoo, “Efficient remote user authentication scheme based on generalized ElGamal signature scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 568-570, May 2004
  • C. C. Yang, H. W. Yang, and R. C. Wang, “Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards”, IEEE Transactions on Consumer Electronics , vol. 50, no. 2, pp. 578-579, May 2004.
  • C. Y. Yang, C. C. Lee, and S. Y. Hsiao, “Man-in-the-middle attack on the authentication of the user from the remote autonomous object", International Journal of Network Security, vol. 1, no. 2, pp. 81-83, 2005.
  • I. E. Liao, C. C. Lee, and M. S. Hwang, “A password authentication scheme over insecure Networks”, Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, 2006.
  • R. C. Wang and C. C. Yang, “Cryptanalysis of two improved password authentication schemes using smart cards", International Journal of Network Security, vol. 3, no. 3, pp. 283-285, Nov.2006.
  • M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak, “A novel remote user authentication Scheme Using bilinear pairings", Computers and Security, vol. 25, no. 3, pp. 184-189, 2006.
  • B. Wang and Z. Q. Li, “A Forward-Secure User Authentication Scheme with Smart Cards", International Journal of Network Security, vol. 3, no. 2, pp. 116-119, Sep. 2006.
  • Xiaojian Tian, Robert W.Zhu, and Duncan S. Wong, “Improved Efficient Remote User Authentication Schemes”, International Journal of Network Security, Vol.4, No.2, pp.149-154, Mar.2007.
  • Y. Y. Wang, J. Y. Liu, F. Xiao, and J. Dan, “A more efficient and secure dynamic ID-based remote user authentication scheme", Computer Communications, vol. 32, no. 4, pp. 583-585, 2009.
  • M. Kumar, “A New Secure Remote User Authentication Scheme with Smart Cards," International Journal of Network Security, vol. 11, no. 2, pp. 88-93, 2010.