首页 | 本学科首页   官方微博 | 高级检索  
     


Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
Authors:Karuppiah  Marimuthu  Das  Ashok Kumar  Li   Xiong  Kumari   Saru  Wu   Fan  Chaudhry   Shehzad Ashraf  Niranchana   R.
Affiliation:1.School of Computing Science and Engineering, VIT University, Vellore, 632 014, Tamilnadu, India
;2.Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India
;3.School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China
;4.Department of Mathematics, Ch. Charan Singh University, Meerut, Uttar Pradesh, 250 005, India
;5.School of Computer Science and Engineering, Xiamen Institute of Technology, Xiamen, Fujian Province, China
;6.Department of Computer Science and Engineering, International Islamic University Islamabad, Islamabad, Pakistan
;
Abstract:

Authentication schemes are widely used mechanisms to thwart unauthorized access of resources over insecure networks. Several smart card based password authentication schemes have been proposed in the literature. In this paper, we demonstrate the security limitations of a recently proposed password based authentication scheme, and show that their scheme is still vulnerable to forgery and offline password guessing attacks and it is also unable to provide user anonymity, forward secrecy and mutual authentication. With the intention of fixing the weaknesses of that scheme, we present a secure authentication scheme. We show that the proposed scheme is invulnerable to various attacks together with attacks observed in the analyzed scheme through both rigorous formal and informal security analysis. Furthermore, the security analysis using the widely-accepted Real-Or-Random (ROR) model ensures that the proposed scheme provides the session key (SK) security. Finally, we carry out the performance evaluation of the proposed scheme and other related schemes, and the result favors that the proposed scheme provides better trade-off among security and performance as compared to other existing related schemes.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号