An Efficient Three Factor Based Remote User Authentication Protocol for Distributed Networks
In distributed networks, one major security drawback is to identify the legitimate remote users of a web service on the Internet. To eliminate this security problem, many researchers have been proposed smart card based remote user authentication for secur
- PDF / 1,284,412 Bytes
- 12 Pages / 439.37 x 666.142 pts Page_size
- 75 Downloads / 223 Views
Abstract. In distributed networks, one major security drawback is to identify the legitimate remote users of a web service on the Internet. To eliminate this security problem, many researchers have been proposed smart card based remote user authentication for secure communication in wireless networks. The wireless networks mostly use password based protocols that are based on two factors-smart card and PIN. But, this type of authentication protocols are susceptible to password guessing attack, stolen verifier attack, replay attack etc. In this paper, we propose a three factor based mutual authentication protocol using smart card in distributed networks, which resists all possible attacks. This protocol is suitable for hand held devices due to the low computational and communicational cost.
Keywords: Mutual authentication exchange
1
·
Smart card
·
Diffie-Hellman key
Introduction
Modern day’s Internet is connecting different types of devices which are communicating with each other in different types of distributed networks. In distributed networks secure communication is challenging as the network is based on client server model where the server may possibly be distributed and replicated. Thus, if a remote user wants to get services, he must authenticate himself in the network. On the basis of the Lamport’s [1] authentication scheme, many single servers authentication protocols are found in the literature. However, his scheme required verification tables, which can be hacked by hackers. When the user access services from more than one server, the single-server authentication schemes become highly inconvenient in a distributed environment. Hence, many multi-server user authentication schemes have been proposed by the researchers [2–12]. Among these protocols, some suffers from the parallel session attack [10,12] and the server spoofing attack and some does not resist replay attack, c IFIP International Federation for Information Processing 2016 Published by Springer International Publishing Switzerland 2016. All Rights Reserved K. Saeed and W. Homenda (Eds.): CISIM 2016, LNCS 9842, pp. 682–693, 2016. DOI: 10.1007/978-3-319-45378-1 59
An Efficient Three Factor Based Remote User Authentication Protocol
683
impersonation attack and fails to proof perfect forward security [9,11]. The concept of dynamic ID-based authentication scheme are found in literature [13–17]. These schemes uses smart cards for distributed systems. Sood et al. scheme [15] is based on elliptic curve cryptography which protects all such attacks. Such authentication schemes based on public key cryptography are very difficult to comprise because of the inherent strength of public key systems, but these schemes are very expensive as the use of public key cryptography involves calculation of exponential operations, which needs a lot of processing time. So, the computational cost and efficiency will increases in such cases. From the literature, it can be summaries that a multi-server authentication scheme must have mutual authentication with no verification ta
Data Loading...