Skip to main content

A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3459 Accesses

Abstract

User authentication is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs), Smartcard, Laptops. User authentication is a difficult for every system providing safe access to precious, private information, or personalized services. User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users. Remote mutual authentication is the best solution for remote accessing in Wi-Fi environment. In this paper we propose a new remote mutual authentication scheme in wireless environment without maintaining the password table. This is based on ElGamal’s. It provides high security and mutual authentication at a reasonable computational cost. Furthermore it restricts most of the current attacking mechanisms. It is simple and can be adopted in any kind of lightweight devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L.: Password authentication with insecure communication. Communication of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  2. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  3. Mitchell, C.: Limitation of challenge–response entity authentication. Electronics Letters 25(17), 1195–1196 (1989)

    Article  Google Scholar 

  4. Chang, C.C., Wu, T.C.: Remote password authentication with smart cards. IEE Proceedings 138(3), 165–168 (1993)

    Google Scholar 

  5. Chang, C.C., Hwang, S.J.: Using smart cards to authenticate remote passwords. Computers and Mathematics with Applications 26(7), 19–27 (1993)

    Article  MATH  Google Scholar 

  6. Wu, T.C.: Remote login authentication scheme based on a geometric approach. Computer Communication 18(12), 959–963 (1995)

    Article  Google Scholar 

  7. Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(1), 28–30 (2000)

    Article  Google Scholar 

  8. Chan, C.K., Cheng, L.M.: Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 992–993 (2000)

    Article  Google Scholar 

  9. Li, L.H., Lin, L.C., Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions Neural Networks 12(6), 1498–1504 (2001)

    Article  Google Scholar 

  10. Tang, Y.L., Hwang, M.S., Lee, C.C.: A simple remote user authentication scheme. Mathematical and Computer Modelling 36, 103–107 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  11. Lee, C.C., Hwang, M.S., Yang, W.P.: A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review 36(3), 46–52 (2002)

    Article  Google Scholar 

  12. Lee, C.C., Li, L.H., Hwang, M.S.: A remote user authentication scheme using hash functions. ACM Operating Systems Review 36(4), 23–29 (2002)

    Article  Google Scholar 

  13. Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart card. Computers & Security 21(4), 372–375 (2002)

    Article  Google Scholar 

  14. Awasthi, A.K., Lal, S.: A Remote User Authentication Scheme using Smart Cards with Forward Security. IEEE Transactions on Consumer Electronics 49(4), 1246–1248 (2003)

    Article  Google Scholar 

  15. Shen, J.J., Lin, C.W., Hwang, M.S.: A modified Remote User Authentication Scheme using Smart Card. IEEE Transactions on Consumer Electronics 49(2), 414–416 (2003)

    Article  Google Scholar 

  16. Ku, W.C., Chen, C.M., Lee, H.L.: Cryptanalysis of a variant of Peyravian–Zunic’s password authentication scheme. IEICE Transaction on Communication E86–B(5), 1682–1684 (2003)

    Google Scholar 

  17. Lee, S.-W., Kim, H.-S., Yoo, K.-Y.: Comment on a Remote User Authentication Scheme using Smart Cards with Forward Secrecy. IEEE Transactions on Consumer Electronics 50(2) (May 2004)

    Google Scholar 

  18. Kumar, M.: Some Remarks on a Remote User Authentication Scheme Using Smart Cards with Forward Secrecy. IEEE Transactions on Consumer Electronics 50(2) (May 2004)

    Google Scholar 

  19. Ku, W.C., Chen, S.M.: Weakness and improvement of an efficient password based user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(1), 204–207 (2004)

    Article  Google Scholar 

  20. Awasthi, A.K., Lal, S.: An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 583–586 (2004)

    Article  Google Scholar 

  21. Kumar, M.: New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 597–600 (2004)

    Article  Google Scholar 

  22. Tsai, C.S., Lee, C.C., Hwang, M.-S.: Password Authentication Schemes: Current Status and Key Issues. International Journal of Network Security 3(2), 101–115 (2006)

    Google Scholar 

  23. Tian, X., Zhu, R.W., Wong, D.S.: Improved Efficient Remote User Authentication Schemes. International Journal of Network Security 4(2), 149–154 (2007)

    Google Scholar 

  24. Yongliang, L., Gao, W., Yao, H., Yu, X.: Elliptic Curve Cryptography Based Wireless Authentication Protocol. International Journal of Network Security 5(3), 327–337 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Muniyandi, A.P., Ramasmy, R., Indurani (2010). A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics