Skip to main content

An Improved Lightweight Pseudonym Identity Based Authentication Scheme on Multi-server Environment

  • Conference paper
  • First Online:
Wireless Communications, Networking and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 348))

Abstract

Recently, Xue et al. proposed a lightweight dynamic pseudonym identity based authentication and key agreement protocol for multi-server architecture (2014). They claimed that their scheme overcomes security flaws of related schemes. In this paper, we reanalyze the security of Xue et al.’s scheme and show that their scheme cannot resist password guessing attacks. In addition, their scheme cannot achieve user anonymity and untraceability. To conquer these defects, we propose an improved and lightweight pseudonym identity based authentication scheme for multi-server environment. Compared with Xue et al.’s scheme, our protocol not only maintains the merits, but also overcomes the security flaws.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Li, L., Lin, I.C., Hwang, M.S.: A remote authentication scheme for multi-server architecture using neural networks. IEEE Trans. Neural Netw. 12, 1498–1504 (2001)

    Article  Google Scholar 

  2. Lin, I.C., Hwang, M.S., Li, L.H.: A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. 19, 13–22 (2003)

    Article  MATH  Google Scholar 

  3. Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27, 115–121 (2008)

    Article  Google Scholar 

  4. Guo, D.L., Wen, F.T.: Analysis and improvement of a robust smart card based-authentication scheme for multi-server architecture. Wirel. Pers. Commun. 78, 475–490 (2014)

    Article  Google Scholar 

  5. Wen, F.T., Li, X.L.: An improved dynamic ID-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38, 381–387 (2012)

    Article  Google Scholar 

  6. He, D.B., Chen, J.H., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36, 1989–1995 (2012)

    Article  Google Scholar 

  7. Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33, 1–5 (2010)

    Article  Google Scholar 

  8. Wen, F.T., Susilo, W., Yang, G.M.: A robust smart card based anonymous user authentication protocol for wireless communications. Secur. Commun. Netw. 7, 987–993 (2013)

    Article  Google Scholar 

  9. Li, X., Xiong, Y.P., Ma, J., Wang, W.D.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35, 763–769 (2012)

    Article  Google Scholar 

  10. Xue, K.P., Hong, P.L., Ma, C.S.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80, 195–206 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  11. Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography. Springer, New York (2004)

    MATH  Google Scholar 

  12. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: 19th Annual International Cryptology Conferrence, pp. 388–397, vol. 1666 (1999)

    Google Scholar 

  13. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51, 541–552 (2002)

    Article  MathSciNet  Google Scholar 

  14. Leng, X.F.: Smart card applications and security. Inf. Secur. Tech. Rep. 14, 36–45 (2009)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by Natural Science Foundation of Shandong Province (No. ZR2013FM009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hao Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Lin, H., Wen, F., Du, C. (2016). An Improved Lightweight Pseudonym Identity Based Authentication Scheme on Multi-server Environment. In: Zeng, QA. (eds) Wireless Communications, Networking and Applications. Lecture Notes in Electrical Engineering, vol 348. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2580-5_102

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2580-5_102

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2579-9

  • Online ISBN: 978-81-322-2580-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics