The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Several authors have put forward various authentication protocols for multi-server environment during the past decade. Wang et al. recently proposed a biometric-based authentication with key agreement...
In 2010, Yuan et al. proposed a biometric-based user authentication scheme for wireless sensor networks (WSN). However, this paper demonstrates that Yuan et al.'s scheme has some drawbacks: insider attack, impersonation attack by a malicious registered user, and GW-node or sensor node impersonate attacks. To mitigate the security breaches, this paper also proposes a new biometric-based user authentication...
This paper proposes a new three-factor authenticated key agreement scheme for SIP on elliptic curve cryptosystem (ECC). In the proposed scheme, we adopts three-factor (password, token, and biometrics) authentication technique to provide strong authentication. In order to provide secure and efficient key agreement between the user client and the SIP server, the proposed scheme adopts ECC to offer a...
This paper proposes computation-and communication-efficient three-party encrypted key exchange (CC3EKE) protocols to minimize the complexity of computational and communicational costs among all users and fit three-party communication environments. Compare with related 3EKE protocols, the proposed CC3EKE protocols have enhanced computational and communicational efficiency. As a result, the proposed...
This paper proposes an efficient and secure three-party smart card-based authentication (3PSA) scheme based on one-way hash function without verification table to minimize the complexity of hash operation among all users and fit three-party communication. The proposed 3PSA scheme is based on the random nonce, uses one-way hash function, and does not need to store any verification table in the server...
This paper proposes a new efficient and secure multiserver authentication scheme based on one-way hash function without verification table to minimize the complexity of hash operation among all users and fit multi-server communication environments. Compare with related multi-serve authentication schemes, the proposed scheme has strong security and enhanced computational efficiency. Thus, the proposed...
In 2009, Yang and Chang proposed an ID-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem (ECC). Based upon ID-based concept, Yang and Chang scheme (YC scheme) does not require additional computations for certificate and is not constructed by bilinear-pairings, which is an expensive operation on elliptic curve. In addition, YC scheme not only provides mutual...
In 2007, Chen et al. proposed a RFID authentication protocol for anti-counterfeiting and privacy protection. A feasible security mechanism for anti-counterfeiting and privacy protection was proposed using XOR and random number shifting operations to enhance RFID tags security providing a low cost. However, their authentication protocol has some drawbacks and security problems because they did not...
In 2008, Tsai proposed an efficient nonce-based authentication scheme for Session Initiation Protocol (SIP). The current paper, however,demonstrates that Tsai's authentication scheme is still vulnerable to off-line password guessing attacks, Denning-Sacco attack and stolen-verifier attacks, and does not provide perfect forward secrecy. We also propose a new secure and efficient authentication scheme...
Security and privacy on authentication protocol are very important in RFID (Radio Frequency Identification) systems which will become an important part of our daily life. However, the low-cost RFID tags can't perform effective cost cryptographic authentication due to limitation of power and storage resources. In this paper, we propose an efficient authentication protocol in terms of both communication...
In 2008, Wu et al. proposed a new authentication and key exchange (NAKE) protocol based on elliptic curve cryptography for session initiation protocol, which provides provable security in CK security model. This paper, however, demonstrates that Wu et al.'s NAKE protocol is vulnerable to off-line password guessing attacks and then presents an improved protocol in order to isolate such a problem.
Okubo et al. proposed a hash-chain based authentication protocol which protects users' location privacy and anonymity with strong forward security. However, Li et al. claimed that the hash-chain calculation must be a burden on low-cost RFID tags and gives back-end servers heavy calculation loads since the numbers for hash computation are required in a hash chaining technique. Thus, the non-group cellular...
In 2007, Shim pointed out that AuthA protocol which is in the process of being standardized by IEEE are vulnerable to chosen protocol attacks and then suggested some coun- termeasures against the attacks. In this paper, we demonstrate another vulnerability of Shim's improved AuthA protocol and then present an improvement to repair the security flaws of the protocol.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.