Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 404))

Abstract

Smart card and password-based user authentication scheme is popular for accessing remote services from the remote server over insecure communication. In this regard, numerous user authentication protocols have been proposed in the literature. However, we have observed that still none of the protocols provide complete facilities such as password change process, password recover process, and smart card revocation process to the registered user. The main aim of this paper is to design a secure user authentication protocol which provides complete facilities to the registered user. The security analysis of the protocol is presented which confirms that the same protocol is secure against various common attacks. Our protocol is not only provide complete facilities to the registered user, but also provides session key agreement as well as mutual authentication between the \(U_i\) and RS. The performance of the proposed scheme is relatively better than existing related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amin, R.: Cryptanalysis and an efficient secure id-based remote user authentication scheme using smart card. In: IJCA. vol. 75, pp. 1149–1157. Citeseer (2013)

    Google Scholar 

  2. Amin, R., Biswas, G.P.: Anonymity preserving secure hash function based authentication scheme for consumer usb mass storage device. In: IEEE 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1–6. (2015)

    Google Scholar 

  3. Amin, R., Biswas, G.P.: Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arab. J. Sci. Eng. 1–15 (2015). http://dx.doi.org/10.1007/s13369-015-1743-5

  4. Amin, R., Biswas, G.P.: Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wireless Pers. Commun. 1–24 (2015)

    Google Scholar 

  5. Amin, R., Biswas, G.P.: An improved rsa based user authentication and session key agreement protocol usable in tmis. J. Med. Syst. 39(8), 79 (2015). http://dx.doi.org/10.1007/s10916-015-0262-y

  6. Amin, R., Biswas, G.P.: A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis. J. Med. Syst. 39(3), 1–17 (2015)

    Article  Google Scholar 

  7. Amin, R., Biswas, G.P.: Remote access control mechanism using rabin public key cryptosystem. In: Information Systems Design and Intelligent Applications, pp. 525–533. Springer (2015)

    Google Scholar 

  8. Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. (2015)

    Google Scholar 

  9. Amin, R., Biswas, G.P.: A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8), 78 (2015). http://dx.doi.org/10.1007/s10916-015-0258-7

  10. Amin, R., Maitra, T., Rana, S.P.: An improvement of wang. et. al.s remote user authentication scheme against smart card security breach. Int. J. Comput. Appl. 75(13), 37–42 (2013)

    Google Scholar 

  11. Awasthi, A.K., Srivastava, K., Mittal, R.: An improved timestamp-based remote user authentication scheme. Comput. Electr. Eng. 37(6), 869–874 (2011)

    Article  Google Scholar 

  12. Chang, Y.F., Tai, W.L., Chang, H.C.: Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 27(11), 3430–3440 (2014)

    Google Scholar 

  13. Chou, J.S., Huang, C.H., Huang, Y.S., Chen, Y.: Efficient two-pass anonymous identity authentication using smart card. IACR Cryptology ePrint Archive 2013, 402 (2013)

    Google Scholar 

  14. Giri, D., Maitra, T., Amin, R., Srivastava, P.: An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1), 1–9 (2015)

    Article  Google Scholar 

  15. He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 321, 263–277 (2015), security and privacy information technologies and applications for wireless pervasive computing environments

    Google Scholar 

  16. He, D., Kumar, N., Chilamkurti, N., Lee, J.H.: Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J. Med. Syst. 38(10), 116 (2014)

    Article  Google Scholar 

  17. Hsieh, W.B., Leu, J.S.: Exploiting hash functions to intensify the remote user authentication scheme. Comput. Secur. 31(6), 791–798 (2012)

    Google Scholar 

  18. Islam, S.H.: A provably secure id-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack. Wireless Pers. Commun. 79(3), 1975–1991 (2014)

    Article  MathSciNet  Google Scholar 

  19. Islam, S.H.: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312, 104–130 (2015)

    Article  MathSciNet  Google Scholar 

  20. Islam, S., Gosta Pada Biswas, K.K.C.: Cryptanalysis of an improved smartcard-based remote password authentication scheme. Inf. Sci. Lett. 3(1), 35–40 (2014)

    Google Scholar 

  21. Islam, S., Khan, M.K., Obaidat, M., Muhaya, F.: Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wireless Pers. Commun. 1–22 (2015)

    Google Scholar 

  22. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology CRYPTO99. pp. 388–397. Springer (1999)

    Google Scholar 

  23. Kumari, S., Khan, M.K., Li, X.: An improved remote user authentication scheme with key agreement. Comput. Electr. Eng. 40(6), 1997–2012 (2014)

    Article  Google Scholar 

  24. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  25. Messerges, T.S., Dabbish, E., Sloan, R.H., et al.: Examining smart-card security under the threat of power analysis attacks. Comput. IEEE Trans. 51(5), 541–552 (2002)

    Article  MathSciNet  Google Scholar 

  26. Shen, J.J., Lin, C.W., Hwang, M.S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput. Secur. 22(7), 591–595 (2003)

    Article  Google Scholar 

  27. Ku, W.C.: S.M.C. Weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(1), 204–207 (2004)

    Article  Google Scholar 

  28. Wang, D., Ma, C.G., Zhang, Q.M., Zhao, S.: Secure password-based remote user authentication scheme against smart card security breach. J. Netw. 8(1), 148–155 (2013)

    MathSciNet  Google Scholar 

  29. Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput. Stan. Interfaces 29(5), 507–512 (2007)

    Article  Google Scholar 

  30. Wen, F., Li, X.: An improved dynamic id-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38(2), 381–387 (2012)

    Article  Google Scholar 

  31. Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160–1172 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  32. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. Consum. Electron. IEEE Trans. 50(2), 612–614 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajeev Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Kumar, R., Amin, R., Karati, A., Biswas, G.P. (2016). Secure Remote Login Scheme with Password and Smart Card Update Facilities. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_41

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2695-6_41

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2693-2

  • Online ISBN: 978-81-322-2695-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics