R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala
{"title":"Improvement of the dynamic ID-based remote user authentication scheme","authors":"R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala","doi":"10.1109/I-SOCIETY16502.2010.6018817","DOIUrl":null,"url":null,"abstract":"Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is secure. In this paper, we show that Das, Saxena and Gulati's scheme is vulnerable to insider, masquerade, and server spoofing attacks. Moreover, it fails to provide mutual authentication. In order to remedy these drawbacks, this paper proposes a secure dynamic ID-based remote user authentication scheme using smart cards. The performance evaluation and security analysis show that our proposal is feasible in terms of computational cost, storage capacity, and the scheme can resist several attacks.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":" 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018817","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is secure. In this paper, we show that Das, Saxena and Gulati's scheme is vulnerable to insider, masquerade, and server spoofing attacks. Moreover, it fails to provide mutual authentication. In order to remedy these drawbacks, this paper proposes a secure dynamic ID-based remote user authentication scheme using smart cards. The performance evaluation and security analysis show that our proposal is feasible in terms of computational cost, storage capacity, and the scheme can resist several attacks.