• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

Current Result Document : 1 / 2

ÇѱÛÁ¦¸ñ(Korean Title) A User Anonymous Mutual Authentication Protocol
¿µ¹®Á¦¸ñ(English Title) A User Anonymous Mutual Authentication Protocol
ÀúÀÚ(Author) Saru Kumari   Xiong Li   Fan Wu   Ashok Kumar Das   Vanga Odelu   Muhammad Khurram Khan  
¿ø¹®¼ö·Ïó(Citation) VOL 10 NO. 09 PP. 4508 ~ 4528 (2016. 09)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
Widespread use of wireless networks has drawn attention to ascertain confidential communication and proper authentication of an entity before granting access to services over insecure channels. Recently, Truong et al. proposed a modified dynamic ID-based authentication scheme which they claimed to resist smart-card-theft attack. Nevertheless, we find that their scheme is prone to smart-card-theft attack contrary to the author¡¯s claim. Besides, anyone can impersonate the user as well as service provider server and can breach the confidentiality of communication by merely eavesdropping the login request and server¡¯s reply message from the network. We also notice that the scheme does not impart user anonymity and forward secrecy. Therefore, we present another authentication scheme keepingapart the threats encountered in the design of Truong et al.¡¯s scheme. We also prove the security of the proposed scheme with the help of widespread BAN ( Burrows, Abadi and Needham ) Logic.
Å°¿öµå(Keyword) Guessing and Impersonation attacks   Authentication   Forward secrecy   BAN Logic.  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå