769 research outputs found
An efficient bilateral remote user authentication scheme with smart cards
In this paper, we propose an efficient bilateral remote user authentication scheme with smart cards. Our scheme ensures both-way authentication, so that any attempt of the adversary to affect the secure communications between the authentication server and the user could not be successful. We also present a brief analysis of our proposed scheme and show that it is well-resistant against the known attacks in remote user authentication process
Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains
In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology. The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing. In the proposed scheme, these cookies are replaced by easily computed authentication credentials using Lamport\u27s well-known one-time passwords. The basic idea in this scheme revolves around utilizing sparse caching units, where authentication credentials pertaining to cookies are stored and fetched once needed, thereby, mitigating computational overhead generally associated with one-way hash constructions. The second and third proposed schemes rely on dividing the one-way hash construction into a hierarchical two-tier construction. Each tier component is responsible for some aspect of authentication generated by using two different hash functions. By utilizing different cryptographic hash functions arranged in two tiers, the hierarchical two-tier protocol (our second contribution) gives significant performance improvement over previously proposed solutions for securing Internet cookies. Through indexing authentication credentials by their position within the hash chain in a multi-dimensional chain, the third contribution achieves improved performance. In the fourth proposed scheme, an attempt is made to apply the one-way hash construction to achieve user and broadcast authentication in wireless sensor networks. Due to known energy and memory constraints, the one-way hash scheme is modified to mitigate computational overhead so it can be easily applied in this particular setting. The fifth scheme tries to reap the benefits of the sparse cache-supported scheme and the hierarchical scheme. The resulting hybrid approach achieves efficient performance at the lowest cost of caching possible. In the sixth proposal, an authentication scheme tailored for the multi-server single sign-on (SSO) environment is presented. The scheme utilizes the one-way hash construction in a Merkle Hash Tree and a hash calendar to avoid impersonation and session hijacking attacks. The scheme also explores the optimal configuration of the one-way hash chain in this particular environment. All the proposed protocols are validated by extensive experimental analyses. These analyses are obtained by running simulations depicting the many scenarios envisioned. Additionally, these simulations are supported by relevant analytical models derived by mathematical formulas taking into consideration the environment under investigation
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common session key by authenticating each other. Recently in 2014, Kumari et al. proposed the efficient scheme for remote user authentication. However in this paper, we show that the Kumari et al.โs scheme is vulnerably susceptible to the Insider Attack, Stolen Verifier Attack, Session Key Disclosure Attack, Password Guessing Attack, Modification Attack, User Impersonation Attack, Replay Attack, Shoulder Surfing Attack and Denial of Service Attack. Afterwards, we have proposed an improved remote user authentication scheme to deal with these attacks and other attacks
Estimating reliability impact of biometric devices in large scale applications
In the last two decades, there has been a tremendous growth of biometric applications especially in security. Reliability of the biometric devices is extremely important.;This thesis discusses an approach for estimating the reliability of systems, which contain biometric user authentication subsystem. The ECRA (Early Component Based Reliability Assessment) tool utilizes an easy to use interface and employs the Bayesian algorithm to predict the system reliability. This application of the ECRA technique to biometrics is new. Using the UML diagrams and the ECRA tool, the reliability of the system is predicted
A Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the
simplest and the most convenient authentication mechanisms
to deal with secret data over insecure networks.
These types of schemes are applicable to the areas
such as computer networks, wireless networks, remote
login systems, operation systems and database management
systems.The goal of a remote user authentication
scheme is to identify a valid card holder as having
the rights and privileges indicated by the issuer of
the card. In recent years, so many remote user authentication
schemes have been proposed to authenticate a
legitimate user, but none of them can solve all possible
problems and withstand all possible attacks. This
paper presents a secure remote user authentication
scheme with smart cards. The proposed scheme provides
the essential security requirements and achieves
particular attributes
- โฆ