CFP last date
20 May 2024
Reseach Article

An Improved Efficient Remote User Authentication Scheme in Multi-server Environment using Smart Card

by Ruhul Amin, Tanmoy Maitra, Debasis Giri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 22
Year of Publication: 2013
Authors: Ruhul Amin, Tanmoy Maitra, Debasis Giri
10.5120/12100-8290

Ruhul Amin, Tanmoy Maitra, Debasis Giri . An Improved Efficient Remote User Authentication Scheme in Multi-server Environment using Smart Card. International Journal of Computer Applications. 69, 22 ( May 2013), 1-6. DOI=10.5120/12100-8290

@article{ 10.5120/12100-8290,
author = { Ruhul Amin, Tanmoy Maitra, Debasis Giri },
title = { An Improved Efficient Remote User Authentication Scheme in Multi-server Environment using Smart Card },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 22 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number22/12100-8290/ },
doi = { 10.5120/12100-8290 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:58.014403+05:30
%A Ruhul Amin
%A Tanmoy Maitra
%A Debasis Giri
%T An Improved Efficient Remote User Authentication Scheme in Multi-server Environment using Smart Card
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 22
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem arises if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. In 2012, Taygi et al. [1] proposed a scheme for multi-server environment. But it is found that their proposed scheme is insecure against user impersonation attack, server masquerading attack, collaboration attack between a valid user and a server, smart card stolen attack, password guessing attack and password change attack. Then we propose an improved scheme can overcome possible attacks and also provides better computational cost as well as communication cost than related schemes published earlier.

References
  1. J. K. Tyagi, A. K. Srivastava and P. S. Patwal, "Remote user authentication scheme in multi-server environment using smart card", International Journal of Computer Applications (0975 8887), vol. 57, no. 12, pp. 1-5, November 2012.
  2. Li, L. , Lin, I. , Hwang, M. S. , "A remote password authentication scheme for multi-server architecture using neural networks", IEEE Transaction on Neural Networks, vol. 12, pp. 1498-1504, 2001.
  3. Lin, I. C. , Hwang, M. S. , Li, L. H. , "A new remote user authentication scheme for multi-server architecture", Future Generation Computer Systems, vol. 19, pp. 13-22, 2003.
  4. Elgamal, T. , "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, vol. 31(4), pp. 469-472, 1985.
  5. Cao, X. , Zhong, S. , "Breaking a remote user authentication scheme for multi-server architecture", IEEE Communications Letters, vol. 10, pp. 580-581, 2006.
  6. Juang, W. S. , "Efficient password authenticated key agreement using smart cards", Computers and Security vol. 23, pp. 167-173, 2004.
  7. Ku,W. C. , Chuang, H. M. , Chiang, M. H. and Chang, K. T. , "Weaknesses of a multi-server password authenticated key agreement scheme", In Proceedings of the 2005 National computer Symposium, vol. 138, pp. 1-5, 2005.
  8. Chang, C. C. , Lee, J. S. , "An efficient and secure multi-server password authentication scheme using smart cards", In Proceedings of the International Conference on Cyberworlds, pp. 417-422, 2004.
  9. Liao, Y. P. , Wang, S. S. , "A secure dynamic ID based remote user authentication scheme for multi-server environment", Computer Standards and Interfaces, vol. 31, pp. 24-29, 2009.
  10. Chen, T. Y. , Hwang, M. S. , Lee, C. C. and Jan, J. K. , "Cryptanalysis of a secure dynamic ID based remote user authentication scheme for multi-server environment", In Proceedings of the 4th International Conference on Innovative Computing, Information and Control, pp. 725- 728, 2009.
  11. Hsiang, C. , Shih, W. K. , "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment", Computer Standards and Interfaces, vol. 31, pp. 1118-1123, 2009.
  12. Sood, S. K. , Sarje, A. K. , Singh, K. , "A secure dynamic identity based authentication protocol for multiserver architecture", Journal of Network and Computer Applications, vol. 34, pp. 609-618, 2011.
  13. Tsai, J. L. , "Efficient multi-server authentication scheme based on one-way hash function without verification table", Computers and Security, vol. 27, pp. 115-121, 2008.
  14. Zhu, H, Liu, T. and Liu, J. , "Robust and simple multiserver authentication protocol without verification table", In Proceedings of the 9th International Conference on Hybrid Intelligent Systems, pp. 13-22, 2009.
  15. Denning, Dorothy E, Sacco, Giovanni Maria, "Timestamps in key distributed protocols", Communication of the ACM, vol. 24, pp. 533-535, 1981.
  16. P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis", Proceedings of Advances in Cryptology, pp. 388-397, 1999.
  17. T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
  18. Whitfield Diffie and Martin E. Hellman, "New Directions in Cryptography". IEEE Transactions on Information Theory, vol. IT-22 (6), pp. 644-654, November 1976.
Index Terms

Computer Science
Information Sciences

Keywords

Attack Authentication Password Smart Card