Online citations, reference lists, and bibliographies.
← Back to Search

Dynamic ID-based Remote User Password Authentication Schemes Using Smart Cards: A Review

R. Madhusudhan, R. C. Mittal
Published 2012 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Remote user authentication is a mechanism, in which the remote server verifies the legitimacy of a user over an insecure communication channel. Until now, there have been ample of remote user authentication schemes published in the literature and each published scheme has its own merits and demerits. A common feature among most of the published schemes is that the user's identity (ID) is static in all the transaction sessions, which may leak some information about that user and can create risk of identity theft during the message transmission. To overcome this risk, many researchers have proposed dynamic ID based remote user authentication schemes. In this paper, we have defined all the security requirements and all the goals an ideal password authentication scheme should satisfy and achieve. We have presented the results of our survey through six of the currently available dynamic ID based remote user authentication schemes. All the schemes are vulnerable to guessing attack except Khan et al.'s scheme, and do not meet the goals such as session key agreement, secret key forward secrecy. In the future, we hope an ideal dynamic ID based password authentication scheme, which meets all the security requirements and achieves all the goals can be developed.
This paper references
10.1016/j.csi.2008.09.006
An improved smart card based password authentication scheme with provable security
J. Xu (2009)
10.6633/IJNS.200703.4(2).04
Improved Efficient Remote User Authentication Schemes
X. Tian (2007)
10.1016/j.comcom.2008.11.019
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
H. Hsiang (2009)
10.1016/j.csi.2006.11.005
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
X. Wang (2007)
10.1093/ietcom/e88-b.5.2165
Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards
W. Ku (2005)
10.1109/NWESP.2005.67
Security enhancement for a dynamic ID-based remote user authentication scheme
I. Liao (2005)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1016/j.comcom.2010.02.011
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
M. Khan (2011)
10.1109/TCE.2004.1277863
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
W. Ku (2004)
Comment on A dynamic ID-based Remote User Authentication Scheme
A. Awasthi (2004)
10.1016/j.cose.2005.03.006
Robust remote authentication scheme with smart cards
C. Fan (2005)
10.1016/j.jss.2010.07.062
Two robust remote user authentication protocols using smart cards
K. Yeh (2010)
10.1016/j.jcss.2008.04.002
Two-factor mutual authentication based on smart cards and passwords
G. Yang (2008)
10.1109/TCE.2004.1309424
Improved efficient remote user authentication scheme using smart cards
Sung-Woon Lee (2004)
10.1109/30.826377
A new remote user authentication scheme using smart cards
M. Hwang (2000)
10.1007/11915034_73
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme
E. Yoon (2006)
10.1016/j.cose.2004.06.004
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme
E. Yoon (2005)
10.1145/567331.567335
A flexible remote user authentication scheme using smart cards
C. Lee (2002)
10.1016/j.comcom.2008.11.008
A more efficient and secure dynamic ID-based remote user authentication scheme
Y. Wang (2009)
10.1109/TIT.1985.1057074
A public key cryptosystem and a signature scheme based on discrete logarithms
T. Elgamal (1985)
10.1016/0167-4048(96)00005-3
Refereed paper: Smart card based secure password authentication scheme
Wang Shiuh-Jeng (1996)
10.1109/CSSE.2008.1043
A Novel User Authentication Scheme Using Smart Cards
Qi Xie (2008)
10.1145/358790.358797
Password authentication with insecure communication
L. Lamport (1981)
10.1109/TCE.2003.1209534
A modified remote user authentication scheme using smart cards
Jau-Ji Shen (2003)
10.1109/TCE.2004.1309441
A dynamic ID-based remote user authentication scheme
M. Das (2004)
10.1109/30.920446
An efficient remote use authentication scheme using smart cards
H. Sun (2000)
10.1109/AINA.2005.54
A remote authentication scheme preserving user anonymity
H. Chien (2005)
10.1016/j.jss.2009.07.050
DoS-resistant ID-based password authentication scheme using smart cards
M. Hwang (2010)
An Efficient Remote User Authentication Scheme Using Smart Cards
H. Sun (2000)
10.1109/TCE.2004.1309430
An enhanced remote user authentication scheme using smart cards
A. Awasthi (2004)
10.1109/WCICA.2008.4593658
An improvement of dynamic ID-based remote user authentication scheme with smart cards
Zhengxian Gao (2008)
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
M. Misbahuddin (2008)
10.1109/ICMLC.2008.4620972
Improvement on the dynamic ID-based remote user authentication scheme
Yung-Cheng Lee (2008)
10.1016/S0167-4048(99)80136-9
Password authentication schemes with smart cards
Wen-Her Yang (1999)
10.1109/ISBAST.2008.4547656
An efficient and secure remote mutual authentication scheme with smart cards
M. Khan (2008)
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
M. A. Ahmed (2010)



This paper is referenced by
10.1145/2799979.2799984
A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards
Subhasish Banerjee (2015)
FACE RECOGNITION USING FINGERPRINT-STEGANOGRAPHIC MECHANISM
V. Ezhilarasi (2017)
10.13053/CYS-18-4-1398
Security Enhancement on Li-Lee's Remote User Authentication Scheme Using Smart Card
Rafael Martínez-Peláez (2014)
10.1109/ACCESS.2020.2979906
A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
Shuailiang Zhang (2020)
10.1007/S11276-018-1841-X
Lightweight three factor scheme for real-time data access in wireless sensor networks
Hanguang Luo (2020)
10.2991/AMEII-15.2015.181
Cryptanalysis of Dynamic Identity Based on a Remote User Authentication Scheme for a Multi-server Environment
Chung-Huei Ling (2015)
10.1155/2019/4656281
A Secure and Efficient ECC-Based Anonymous Authentication Protocol
Feifei Wang (2019)
10.1109/ICACT.2015.7224880
Security enhancements of smart card-based remote user password authentication scheme with session key agreement
Young-Hwa An (2015)
10.1145/2897845.2897916
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
Ding Wang (2016)
10.1007/s10916-014-0027-z
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function
A. K. Das (2014)
10.1002/dac.3336
A lightweight password-based authentication protocol using smart card
Chenyu Wang (2017)
10.3390/jsan9010001
D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected Devices
Abdelrahman Abuarqoub (2020)
10.2991/ICWCSN-16.2017.129
An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
Tian-Yang Pan (2017)
10.1109/ICEBE.2016.019
A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems
Wenjin Lei (2016)
10.1088/1742-6596/1087/6/062003
Security Analysis of Improved User Authentication Schemes Using Smart Cards
Xiao Hong Yin (2018)
10.1504/IJCISTUDIES.2012.050360
An enhanced biometrics-based remote user authentication scheme using mobile devices
R. Madhusudhan (2012)
10.1109/tifs.2017.2659640
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
Q. Xie (2017)
10.3390/computers5030015
Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors
A. Yassin (2016)
10.3390/s19092098
An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
Rafael Martínez-Peláez (2019)
Robust Biometrics Based Authentication Scheme Using Watermarking
Mareda Raghavi (2016)
10.21090/ijaerd.54182
Implementation Of Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks.-IJAERD
(2017)
Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review
Ejike Ekeke Kingsley Ugochukwu (2014)
10.1007/978-3-319-72359-4_27
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing
Jian Shen (2017)
Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity
Dheerendra Mishra (2013)
10.1007/s10916-013-9969-9
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
A. K. Das (2013)
10.21640/NS.V8I17.673
Dynamic ID-based remote user authentication scheme using El Gamal encryption system
R. Peláez (2016)
10.1016/J.JKSUCI.2019.01.015
Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes
K. Hussain (2019)
10.1145/3341325.3342020
A Lightweight Two-Factor Authentication Scheme for Mobile Cloud Computing
Abdelrahman Abuarqoub (2019)
10.1109/ACCESS.2019.2941575
An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
B. D. Deebak (2019)
10.1109/CINE48825.2020.234395
A brief overview of User Authentication in Internet of Things architecture
S. Banerjee (2020)
10.1109/CC.2018.8398512
Lightweight mutual authentication scheme for protecting identity in insecure environment
Xu Wu (2018)
10.1007/s12083-014-0321-z
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
Dheerendra Mishra (2016)
See more
Semantic Scholar Logo Some data provided by SemanticScholar