Abstract
User authentication is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs), Smartcard, Laptops. User authentication is a difficult for every system providing safe access to precious, private information, or personalized services. User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users. Remote mutual authentication is the best solution for remote accessing in Wi-Fi environment. In this paper we propose a new remote mutual authentication scheme in wireless environment without maintaining the password table. This is based on ElGamal’s. It provides high security and mutual authentication at a reasonable computational cost. Furthermore it restricts most of the current attacking mechanisms. It is simple and can be adopted in any kind of lightweight devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lamport, L.: Password authentication with insecure communication. Communication of the ACM 24(11), 770–772 (1981)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)
Mitchell, C.: Limitation of challenge–response entity authentication. Electronics Letters 25(17), 1195–1196 (1989)
Chang, C.C., Wu, T.C.: Remote password authentication with smart cards. IEE Proceedings 138(3), 165–168 (1993)
Chang, C.C., Hwang, S.J.: Using smart cards to authenticate remote passwords. Computers and Mathematics with Applications 26(7), 19–27 (1993)
Wu, T.C.: Remote login authentication scheme based on a geometric approach. Computer Communication 18(12), 959–963 (1995)
Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(1), 28–30 (2000)
Chan, C.K., Cheng, L.M.: Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 992–993 (2000)
Li, L.H., Lin, L.C., Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions Neural Networks 12(6), 1498–1504 (2001)
Tang, Y.L., Hwang, M.S., Lee, C.C.: A simple remote user authentication scheme. Mathematical and Computer Modelling 36, 103–107 (2002)
Lee, C.C., Hwang, M.S., Yang, W.P.: A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review 36(3), 46–52 (2002)
Lee, C.C., Li, L.H., Hwang, M.S.: A remote user authentication scheme using hash functions. ACM Operating Systems Review 36(4), 23–29 (2002)
Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart card. Computers & Security 21(4), 372–375 (2002)
Awasthi, A.K., Lal, S.: A Remote User Authentication Scheme using Smart Cards with Forward Security. IEEE Transactions on Consumer Electronics 49(4), 1246–1248 (2003)
Shen, J.J., Lin, C.W., Hwang, M.S.: A modified Remote User Authentication Scheme using Smart Card. IEEE Transactions on Consumer Electronics 49(2), 414–416 (2003)
Ku, W.C., Chen, C.M., Lee, H.L.: Cryptanalysis of a variant of Peyravian–Zunic’s password authentication scheme. IEICE Transaction on Communication E86–B(5), 1682–1684 (2003)
Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Comment on a Remote User Authentication Scheme using Smart Cards with Forward Secrecy. IEEE Transactions on Consumer Electronics 50(2) (May 2004)
Kumar, M.: Some Remarks on a Remote User Authentication Scheme Using Smart Cards with Forward Secrecy. IEEE Transactions on Consumer Electronics 50(2) (May 2004)
Ku, W.C., Chen, S.M.: Weakness and improvement of an efficient password based user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(1), 204–207 (2004)
Awasthi, A.K., Lal, S.: An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 583–586 (2004)
Kumar, M.: New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 597–600 (2004)
Tsai, C.S., Lee, C.C., Hwang, M.-S.: Password Authentication Schemes: Current Status and Key Issues. International Journal of Network Security 3(2), 101–115 (2006)
Tian, X., Zhu, R.W., Wong, D.S.: Improved Efficient Remote User Authentication Schemes. International Journal of Network Security 4(2), 149–154 (2007)
Yongliang, L., Gao, W., Yao, H., Yu, X.: Elliptic Curve Cryptography Based Wireless Authentication Protocol. International Journal of Network Security 5(3), 327–337 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Muniyandi, A.P., Ramasmy, R., Indurani (2010). A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)