Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. They claimed that their scheme can resist several types of attacks. However, through careful analysis, we find that Li et al.'s scheme is vulnerable to stolen smart card and off-line dictionary attacks, replay attacks, impersonation attacks and server spoofing attacks. By analyzing other similar schemes, we find that a certain type of dynamic ID-based multi-server authentication scheme in which only hash functions are used and whereby no registration center participates in the authentication and session key agreement phase faces difficulties in providing perfectly efficient and secure authentication. To compensate for these shortcomings, we propose a novel dynamic ID-based remote user authentication scheme for multi-server environments based on pairing and self-certified public keys. Security and performance analyses show that the proposed scheme is secure against various attacks and has many excellent features.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6177128 | PMC |
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0202657 | PLOS |
IEEE J Biomed Health Inform
November 2024
Ankle moment plays an important role in human gait analysis, patients' rehabilitation process monitoring, and the human-machine interaction control of exoskeleton robots. However, current ankle moment estimation methods mainly rely on inverse dynamics (ID) based on optical motion capture system (OMC) and force plate. These methods rely on fixed instruments in the laboratory, which are difficult to be applied to the control of exoskeleton robots.
View Article and Find Full Text PDFAddict Biol
September 2023
National Institute on Drug Dependence, Peking University, Beijing, China.
This work illustrates the accelerated decline in illegal drug use during the COVID-19 pandemic in China. We first reviewed the global effects of the COVID-19 pandemic on the situation of illegal drugs. We then compared the data of the pre-pandemic (2016-2019) and pandemic period (2020-2022) for drug seizures, individuals identified as using drugs, registered and newly discovered illegal drug users and the number of community-treated drug users to demonstrate the fast decline in the use of illegal drugs in China.
View Article and Find Full Text PDFSensors (Basel)
July 2019
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China.
Recently, many dynamic ID based remote user authentication schemes using smart card have been proposed to improve the security in multiple servers architecture authentication systems. In 2017, Kumari and Om proposed an anonymous multi-server authenticated key agreement scheme, which is believed to be secure against a range of network attacks. Nevertheless, in this paper we reanalyze the security of their scheme, and show that the scheme is vulnerable to impersonation attack and server spoofing attack launched by any adversary without knowing any secret information of the victim users.
View Article and Find Full Text PDFPLoS One
March 2019
College of Computer Science and Engineering, Northwest Normal University, Gansu Lanzhou, China.
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. They claimed that their scheme can resist several types of attacks.
View Article and Find Full Text PDFScientificWorldJournal
January 2016
Department of Information Science and Technology, College of Engineering, Anna University, Guindy, Chennai, Tamilnadu 600 025, India.
Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!