Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

A Review on Remote User Authentication Schemes Using Smart Cards

Download
454 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_64,
        author={Keerti Srivastava and Amit Awasthi and R. Mittal},
        title={A Review on Remote User Authentication Schemes Using Smart Cards},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={},
        doi={10.1007/978-3-642-37949-9_64}
    }
    
  • Keerti Srivastava
    Amit Awasthi
    R. Mittal
    Year: 2013
    A Review on Remote User Authentication Schemes Using Smart Cards
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_64
Keerti Srivastava1,*, Amit Awasthi1,*, R. Mittal2,*
  • 1: Gautam Buddh University
  • 2: Indian Institute of Technology
*Contact email: keert.cipet@gmail.com, awasthi.amitk@gmail.com, rcmmmfma@iitr.ernet.in

Abstract

Remote user authentication is a mechanism in which the remote server verifies the legitimacy of a user over an insecure communication channel. Password based authentication schemes have been widely deployed to verify the legitimacy of remote users as password authentication is one of the simplest and the most convenient authentication mechanism over insecure networks. In remote user authentication scheme, the user is assigned a smart card, which is being personalized by some parameters and provide the legal users to use the resources of the remote system. Until now, there have been ample of remote user authentication schemes published in the literature and each published schemes have its own merits and demerits. Recently, many schemes proposed are based on the one-way hash function. The computational complexity of their schemes is superior to the discrete logarithm-problem-based schemes. In our paper, we have defined all the security requirements and the goals. An ideal password authentication schemes should satisfy and achieve all of these. We have presented the results of our survey through five of the currently available secure one way hash function based remote user authentication schemes. We hope an ideal smart card (not storing ( , ), which meets all the security requirements and achieves all the goals can be developed.