Abstract
As the mobile network such as using cell phone, tablet PC, notebook services are gradually increased, a smart card comes to one of the useful thing, because of its convenience and portable. Contemporary, smart card-based authentication also can be one of the most generally authentication method. In 2015, Djellali et al. proposed user authentication scheme with preserving user anonymity and mutual authentication. Also, it provides light and profitable mechanism which can be easily applied to limited power or resources. They claimed their scheme is resisted many networks threat. Unfortunately, we discover some vulnerable weakness. In this paper, we demonstrate that their scheme is still unstable to some network threats, such as insider attack, offline-password guessing attack, impersonation attack and replay attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)
Xu, J., Zhu, W.-T., Feng, D.-G.: An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4), 723–728 (2009)
Song, R.: Advanced smart card based password authentication protocol. Computer Standards & Interfaces 32(5), 321–325 (2010)
Shiuh-Jeng, W., Jin-Fu, C.: Smart card based secure password authentication scheme. Computers & Security 15(3), 231–237 (1996)
Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications 7(4), 1–5 (2013)
Juang, W.-S.: Efficient password authenticated key agreement using smart cards. Computers & Security 23(2), 167–173 (2004)
Choi, Y., et al.: Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics. The Scientific World Journal 2014 (2014)
Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 2. IEEE (2005)
Yang, J.-H., Chang, C.-C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security 28(3), 138–143 (2009)
Peris-Lopez, P., et al.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Otm 2006 Workshops On the Move to Meaningful Internet Systems. Springer, Heidelberg (2006)
Djellali, B., et al.: User authentication scheme preserving anonymity for ubiquitous devices. Security and Communication Networks (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kang, D., Mun, J., Lee, D., Won, D. (2015). Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_45
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)