Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.11.503

A Study on Secure Remote User Authentication Scheme using Smart Card  

Go, Sung Jong (순천향대학교 컴퓨터공학과)
Lee, Im Yeong (순천향대학교 소프트웨어학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.11, 2013 , pp. 503-510 More about this Journal
Abstract
Recently, the rapid development of network technology has enabled people to use various services on the internet. However, the existing password-based user authentication system used in the internet environment requires a password table, which is a potential security threat as it could be leaked by an insider. To solve this issue, remote user authentication methods that do not require a user password table have been proposed. Regarding remote user authentication using a smart card in particular, various methods have been suggested to reduce expenses and to improve stability and efficiency, but the possibility of impersonation attacks and password-guessing attacks using information saved in a user's smart card still exist. Therefore, this study proposes a remote user authentication method that can safeguard against impersonation attacks and password guessing attacks, by analyzing weak points of conventional methods and creating a smart card's ID and password that are based on the user's ID and password.
Keywords
Remote User Authentication; Smart Card; Password Guessing Attack; Impersonation Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T.L. Chun, C.L. Cheng, "A ROBUST REMOTE USER AUTHENTICATION SCHEME USING SMART CARD", Information Technology and Control, Vol.40, No.3, pp.236-245, 2011.
2 L. Lamport, "Password authentication with insecure communication" Communications of ACM. Vol 24, Issue 12, pp.770-772, 1981.   DOI   ScienceOn
3 M.S. Hwang, L.H. Li, "A new remote user authentication scheme using smart cards" IEEE Transactions on consumer Electronics, Vol.46, No.1, pp.28-30, 2000.   DOI   ScienceOn
4 H.M. Sun, "An efficient remote use authentication scheme using smart cards", IEEE Transactions on consumer Electronics, Vol 46, No.4, pp.958-961, 2000.   DOI   ScienceOn
5 H.Y. Chien, J.K. Jan, Y.M. Tseng, "An efficient and practical solution to remote authentication: smart card", Computers & Security, Vol.21, No.4, pp.372-375, 2002.   DOI   ScienceOn
6 W.C. Ku, S.M. Chen, "Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Card", IEEE, Transaction on consumer Electronics, Vol.50, No.1, pp.201-207, 2004.
7 E.J. Yoon, E.K.. Rye, K.Y. Yoo. "Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Card", IEEE Transaction on Consumer Electronics, Vol.50, No.2, pp.612-614, 2004.   DOI   ScienceOn
8 N.Y. Lee, Y.C. Chiu, "Improved remote authentication scheme with smart card", Computer Standards & Interfaces 27, pp.177-180, 2005.   DOI   ScienceOn
9 X.M Wang, W.F. Zhang, J.S. Zhang. M.K. Khan, "Cryptanalysis and improvement on two efficient remote", computer Standards & Interface 29, pp.507-512, 2007.   DOI   ScienceOn
10 T.H Chen, H.C. Hsiang, W.K. Shih, "Security enhancement on an improvement on two remote user authentication schemes using smart cards", Future Generation computer Systems 27, pp.377-380, 2011.   DOI   ScienceOn