CFP last date
22 April 2024
Reseach Article

Article:A Secure Dynamic Authentication Scheme for Smart Card based Networks

by Dr. S. Santhosh Baboo, K. Gokulraj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 8
Year of Publication: 2010
Authors: Dr. S. Santhosh Baboo, K. Gokulraj
10.5120/1605-2157

Dr. S. Santhosh Baboo, K. Gokulraj . Article:A Secure Dynamic Authentication Scheme for Smart Card based Networks. International Journal of Computer Applications. 11, 8 ( December 2010), 5-12. DOI=10.5120/1605-2157

@article{ 10.5120/1605-2157,
author = { Dr. S. Santhosh Baboo, K. Gokulraj },
title = { Article:A Secure Dynamic Authentication Scheme for Smart Card based Networks },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 11 },
number = { 8 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 5-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume11/number8/1605-2157/ },
doi = { 10.5120/1605-2157 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:00:00.584869+05:30
%A Dr. S. Santhosh Baboo
%A K. Gokulraj
%T Article:A Secure Dynamic Authentication Scheme for Smart Card based Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 11
%N 8
%P 5-12
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is one of the essential security features in network communication. Authentication process ascertains the legitimacy of the communicating partners in communication. In authentication process, the originator of the communication and the respondent transacts some identification codes of each other prior to start of the message transaction. Several methods have been proposed regarding the authentication process from time to time. Here, we introduce a new authentication scheme based on dynamicity which is relatively a different approach to ensure and enhance the smart card based remote authentication and security. This method discusses about the authentication for smart card based network systems. This method introduces a dynamic authentication scheme which includes number of factors, among them the password, password index, and date of modification are important factors which decides the dynamicity. The static approach authentication schemes are vulnerable to different types of attacks. In order to overcome the threats of the existing approaches, the dynamic authentication scheme is introduced. This scheme ensures the authentication, confidentiality, reliability, integrity and security. The security analysis of this method shows that this scheme is sustainable to the vulnerability attacks during authentication process and provides more security features in networked communications using smart cards.

References
  1. L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol.24, pp. 770-772, Nov. 1981.
  2. C. C. Chang and W. Y. Liao, “A remote password authentication scheme based upon ElGamal’s signature scheme,” Computer &Security, vol. 13, no. 2, pp. 137-144, 1994.
  3. W. H. Yang and S. P. Shieh, “Password authentication schemes with smart cards,” Computers & Security , vol. 18, no. 8, pp. 727-733, 1999.
  4. M. S. Hwang, and L. H. Li, “A new remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp 28-30, Feb. 2000.
  5. C. K. Chan and L. M. Cheng, “Cryptanalysis of a remote user authentication scheme using Smart cards,” IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 992-993, Nov.2000.
  6. T. S. Messerges, E. A. Dabbish, and .H. Sloan, “Examining smart card security under the threat of power analysis attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
  7. A. K. Awasthi and S. Lal, “A remote user authentication scheme using smarts cards with forward secrecy", IEEE Transactions on Consumer Electronic, vol. 49, no. 4, pp.1246-1248, 2003.
  8. J. J. Shen, C. W. Lin, and M. S. Hwang, “A modified remote user authentication Scheme using smart cards”, IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, May 2003.
  9. K. C. Leung, L. M. Cheng, Anthony S. Fong, and C. K. Chan, “Cryptanalysis of a modified remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 49, no. 4, pp. 1243-1245, Nov. 2003.
  10. K. Manoj, “New remote user authentication scheme with smart cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 597-600, 2004.
  11. E. J. Yoon, E. K. Ryu, and K. Y. Yoo, “Efficient remote user authentication scheme based on generalized ElGamal signature scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 568-570, May 2004
  12. C. C. Yang, H. W. Yang, and R. C. Wang, “Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards”, IEEE Transactions on Consumer Electronics , vol. 50, no. 2, pp. 578-579, May 2004.
  13. C. Y. Yang, C. C. Lee, and S. Y. Hsiao, “Man-in-the-middle attack on the authentication of the user from the remote autonomous object", International Journal of Network Security, vol. 1, no. 2, pp. 81-83, 2005.
  14. I. E. Liao, C. C. Lee, and M. S. Hwang, “A password authentication scheme over insecure Networks”, Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, 2006.
  15. R. C. Wang and C. C. Yang, “Cryptanalysis of two improved password authentication schemes using smart cards", International Journal of Network Security, vol. 3, no. 3, pp. 283-285, Nov.2006.
  16. M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak, “A novel remote user authentication Scheme Using bilinear pairings", Computers and Security, vol. 25, no. 3, pp. 184-189, 2006.
  17. B. Wang and Z. Q. Li, “A Forward-Secure User Authentication Scheme with Smart Cards", International Journal of Network Security, vol. 3, no. 2, pp. 116-119, Sep. 2006.
  18. Xiaojian Tian, Robert W.Zhu, and Duncan S. Wong, “Improved Efficient Remote User Authentication Schemes”, International Journal of Network Security, Vol.4, No.2, pp.149-154, Mar.2007.
  19. Y. Y. Wang, J. Y. Liu, F. Xiao, and J. Dan, “A more efficient and secure dynamic ID-based remote user authentication scheme", Computer Communications, vol. 32, no. 4, pp. 583-585, 2009.
  20. M. Kumar, “A New Secure Remote User Authentication Scheme with Smart Cards," International Journal of Network Security, vol. 11, no. 2, pp. 88-93, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Dynamic Authentication Smart Card Reliability Integrity Network Security