Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. They claimed that their scheme can resist several types of attacks. However, through careful analysis, we find that Li et al.'s scheme is vulnerable to stolen smart card and off-line dictionary attacks, replay attacks, impersonation attacks and server spoofing attacks. By analyzing other similar schemes, we find that a certain type of dynamic ID-based multi-server authentication scheme in which only hash functions are used and whereby no registration center participates in the authentication and session key agreement phase faces difficulties in providing perfectly efficient and secure authentication. To compensate for these shortcomings, we propose a novel dynamic ID-based remote user authentication scheme for multi-server environments based on pairing and self-certified public keys. Security and performance analyses show that the proposed scheme is secure against various attacks and has many excellent features.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6177128PMC
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0202657PLOS

Publication Analysis

Top Keywords

dynamic id-based
16
authentication scheme
16
id-based remote
12
remote user
12
user authentication
12
multi-server environments
12
self-certified public
8
public keys
8
smart card
8
scheme multi-server
8

Similar Publications

Ankle moment plays an important role in human gait analysis, patients' rehabilitation process monitoring, and the human-machine interaction control of exoskeleton robots. However, current ankle moment estimation methods mainly rely on inverse dynamics (ID) based on optical motion capture system (OMC) and force plate. These methods rely on fixed instruments in the laboratory, which are difficult to be applied to the control of exoskeleton robots.

View Article and Find Full Text PDF

COVID-19 control accelerates the decline in illegal drug use in China.

Addict Biol

September 2023

National Institute on Drug Dependence, Peking University, Beijing, China.

This work illustrates the accelerated decline in illegal drug use during the COVID-19 pandemic in China. We first reviewed the global effects of the COVID-19 pandemic on the situation of illegal drugs. We then compared the data of the pre-pandemic (2016-2019) and pandemic period (2020-2022) for drug seizures, individuals identified as using drugs, registered and newly discovered illegal drug users and the number of community-treated drug users to demonstrate the fast decline in the use of illegal drugs in China.

View Article and Find Full Text PDF

Recently, many dynamic ID based remote user authentication schemes using smart card have been proposed to improve the security in multiple servers architecture authentication systems. In 2017, Kumari and Om proposed an anonymous multi-server authenticated key agreement scheme, which is believed to be secure against a range of network attacks. Nevertheless, in this paper we reanalyze the security of their scheme, and show that the scheme is vulnerable to impersonation attack and server spoofing attack launched by any adversary without knowing any secret information of the victim users.

View Article and Find Full Text PDF

Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. They claimed that their scheme can resist several types of attacks.

View Article and Find Full Text PDF

Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

ScientificWorldJournal

January 2016

Department of Information Science and Technology, College of Engineering, Anna University, Guindy, Chennai, Tamilnadu 600 025, India.

Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!