Indonesian J
ournal of Ele
c
trical Engin
eering and
Computer Sci
e
nce
Vol. 1, No. 3,
March 20
16, pp. 597
~ 606
DOI: 10.115
9
1
/ijeecs.v1.i3.pp59
7-6
0
6
597
Re
cei
v
ed
No
vem
ber 1
1
, 2015; Re
vi
sed
Jan
uar
y 25, 2
016; Accepte
d
February 1
2
, 2016
Lightwe
ight Communication Overhead Authentication
Scheme Using Smart Card
Ahmed Y. F. Al_Sahlani
1
, Songfen
g Lu
*
, 2
1, 2
School of Computer Sci
e
n
c
e and T
e
chno
log
y
,
Huazh
o
n
g
Uni
v
ersit
y
of Sci
e
n
c
e and T
e
chno
log
y
, W
uha
n 4
300
74, Ch
ina
e-mail: cisco
_a
h81
@
y
ah
oo.co
m
1
, lusongfen
g
@
hust.ed
u
.cn
2
A
b
st
r
a
ct
Authentic
atio
n
takes its pla
c
e to
grant a
u
thori
z
e
d
us
er a remot
e
ac
cess to certai
n onl
ine
resourc
e
s. As w
e
ll, preve
n
t una
uthori
z
e
d
user fro
m
ac
cessin
g
that r
e
sourc
e
s. Unf
o
ryun
atly most
of
authe
nticati
on sche
m
es
cons
i
der only
sec
u
ri
ty factors w
i
thout taki
ng
in
c
onsi
derati
o
n
th
e co
mmunic
a
ti
on
resourc
e
s re
qu
ired. R
e
ce
ntly, Li et. a
l
. pro
p
o
sed
an
en
ha
nced s
m
art ca
rd bas
ed r
e
mo
te user
passw
or
d
authe
nticati
on
sche
m
e. W
e
a
naly
z
e
d
th
eir s
c
he
me
an
d w
e
poi
nted
o
u
t th
at, their sc
he
me re
quir
ed
hi
g
h
communic
a
tio
n
overhe
ad. F
u
rthermore, their
scheme suffe
r
s
from forgery,
user impers
o
n
a
tion a
nd serv
er
impersonation attacks.
Throu
gh this
paper t
o
address
afor
esaid weaknes
s
es, we propose a
Lightweight
communic
a
tio
n
overh
ead
auth
enticati
on sc
he
me
usi
ng s
m
ar
t card. T
he sec
u
rity an
d p
e
rfor
ma
nce
ana
lysi
s
show
s that, ou
r prop
ose
d
sch
eme is
li
ghtw
e
i
ght co
mm
u
n
ic
ation
an
d co
mputatio
n cost
a
s
w
e
ll sec
u
re
a
n
d
can withstand
wide spectrum
of malic
io
us att
a
cks, like forgery, insider, re
play and stolen s
m
art c
a
rd
attac
k
.
Besid
e
s, our
s
c
he
me
enc
o
m
passes
des
ire
d
sec
u
rity attri
butes. T
her
efo
r
e, it is s
u
itab
l
e
for pr
actica
l
use
compar
ed to ot
her rel
a
ted sch
eme.
Key
w
ords
: A
u
thentication,
Securit
y
, Key agreem
ent, Sm
art Card, Lightweight com
m
unication
1. Introduc
tion
No
wad
a
ys, internet an
d
online
servi
c
es be
co
m
e
very essential
as a pa
rt of various
orga
nization
and
huma
n
d
a
ily activities.
Esp
e
cially
with
the rapid
developm
ent of
internet
a
n
d
comm
uni
cati
on technol
ogi
es. E-b
a
n
k
in
g; e-shop
pin
g
; online
ga
ming; e-l
earn
i
ng; …etc, a
r
e an
example
s
of online se
rvice
s
offe
red and
acce
ssed re
motely
thro
ug
h internet. On
the othe
r
ha
nd,
acce
ssi
ng su
ch se
rvice
s
o
v
er
in
se
cu
re cha
nnel
is
a subj
ect of
wi
de spe
c
tru
m
of
se
cu
rity
ri
sks.
Furthe
rmo
r
e,
variou
s a
u
thentication
schem
es pr
op
ose
d
to p
r
ov
id authe
ntica
t
ion in vari
o
u
s
invironm
ents
su
ch a
s
a
u
th
enticatio
n on
client-se
r
ver invironm
ent a
nd auth
entica
t
ion on
wirele
ss
sen
s
o
r
net
work
WSN inv
i
ronm
ent [1], etc. G
ene
ra
lly, authentication take
s i
t
s place as
an
importa
nt pro
c
ed
ure
to ve
rify the legiti
macy of
the
comm
uni
cati
on pa
rtici
pan
ts over i
n
secure
environ
ment
s.
In 1981, Lam
port propo
se
d first remote
use
r
authe
ntication p
r
oto
c
ol based pa
ssword fo
r
ins
e
c
u
r
e
communication [2]. H
i
s sc
heme is ins
e
c
u
re sin
c
e
it
re
quires maintai
n
in
g
a
verificatio
n
table at se
rve
r
sid
e
whi
c
h
can be
rea
c
he
d and m
odifie
d
by an attacker. In 1
991,
Cha
ng an
d
Wu
[3] propo
sed
the first passwo
r
d ba
se
d authentication schem
e usin
g sma
r
t card tech
nol
ogy
without u
s
in
g
verificatio
n
table. Sin
c
e
Then,
ma
ny resea
r
chers prop
os
ed the
i
r auth
enticati
on
scheme
s
u
s
ing
sma
r
t card
to imp
r
ove an
d
a
d
d
re
ss the
secu
rity probl
ems of exi
s
ting
authenti
c
atio
n scheme
s
[4
-10].
Smart ca
rd
have been
widely ado
pted in mode
rn authenti
c
at
ion schem
es to add
se
curity facto
r
. Low cost, portability, and suffici
ent cap
a
city are
the most imp
o
rtant re
ason
s
behin
d
u
s
in
g
sm
art
ca
rd.
Only legitim
a
te user who
posse
sse
s
a
sma
r
t
card a
nd
kno
w
s val
i
d
password ca
n gain acce
ss to certai
n online res
ource
s. Gene
rall
y, Tw
o factors authenti
c
ati
on
proto
c
ol
usin
g sm
art
card
can
re
si
st a
wide
spe
c
trum of attacks such a
s
p
a
s
swo
r
d
gue
ssing
attacks, forg
e
r
y attacks, re
play attacks i
n
sid
e
r
attacks, and smart
card stole
n
attacks [11 ].
Xu et al
in
20
09 p
r
op
osed
their
sma
r
t
ca
rd
authenti
c
at
ion p
r
oto
c
ol
b
a
se
d p
a
sswo
r
d [1
2].
They clai
med
that, their scheme
can
wit
h
stan
d
vario
u
s
attacks eve
n
wh
en
se
curity paramete
r
s
store
d
o
n
the
sma
r
t
card i
s
disclo
se
d. Howeve
r, in
20
10, Song
an
a
l
yzed Xu
et al
’s
scheme
an
d
sho
w
s that,
authori
z
e
d
u
s
er
can
extra
c
t se
curity
inf
o
rmatio
n st
ored in
his/h
e
r
own
sm
art
card
and imp
e
rso
nate anot
her use
r
logi
n. Then, he
pro
posed an
en
han
ced
sche
me [13]. In Same
year, Sood e
t
al sho
w
tha
t, Xu et al’s scheme
i
s
su
ffering from f
o
rge
r
y and
o
ffline dictiona
ry
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
1, No. 3, March 20
16 : 597 – 606
598
attacks, and
then also p
r
o
posed their e
nhan
ce
d sch
e
me [14]. Chen et al analyzed propo
sed
scheme
s
[12
-
14] and foun
d that, in Song’s sch
e
me
[
13], use
r
’s id
entity and se
rver’s
se
cret key
are pe
rma
n
e
n
t and both compo
s
e the
se
cret
key of symmetri
c
e
n
cryptio
n
. So, an attacke
r
can
execute
an
of
fline di
ctiona
ry attacks on
stolen
sm
a
r
t card
to g
u
e
s
s
use
r
’s pa
ssword
and
by
pa
ss
Song’s
sche
me. Sood et
al’s
scheme [
14] doe
s n
o
t achi
eve mutu
al authe
nticat
ion bet
wee
n
the
remote
u
s
er
and th
e a
u
th
enticatio
n
server. Thi
s
im
pl
ies th
at, the
use
r
can
not
verify the vali
dity
of the serve
r
conn
ecte
d to. Then, Che
n
et al
propo
sed thei
r ro
b
u
st sm
art ca
rd based re
m
o
te
use
r
pa
sswo
rd authenti
c
ati
on schem
e [15] over
Xu et al, Sood et al and Song’s sch
e
me
s. In
2013,
Li et
al
[16] an
alyze
d
Chen
et al’
s
sc
heme
an
d foun
d that,
their
sche
m
e
cann
ot en
sure
forwa
r
d
se
cre
c
y, and lo
gin
password verified by
se
rve
r
whi
c
h co
st unne
ce
ssary comm
uni
cati
on
and waste ti
me. Beside
s,
the passwo
r
d ch
ang
e a
c
ti
vity of Chen et al [15] requi
re
s se
rve
r
assista
n
t. Li et al propo
se
d their sche
m
e
to over
co
m
e
the wea
k
ne
sses in
Chen
et al’s sch
e
m
e.
Unfortu
nately
,
most of aforeme
n
tione
d authenti
c
atio
n scheme
s
a
r
e still vulne
r
able to a wi
de
s
p
ec
trum of malic
ious
attac
k
s
.
In this p
ape
r, we, focus
on both
of communi
catio
n
re
so
urce
s
requi
re
d a
s
well a
s
se
curity funct
i
onality of th
e prop
osed schem to
ad
dre
ss afo
r
e
s
aid wea
k
n
e
sse
s
. We aim
to
prop
ose a
secu
re
and li
ghtwei
ght co
mmuni
cati
on
overh
ead
a
u
thentication
schem
e to
save
netwo
rk
co
m
m
unication
reso
urce
s an
d low
co
mpu
t
ation co
st. Our
pro
p
o
s
e
d
sche
me de
tects
and p
r
event
s
dupli
c
ated
re
gistratio
n
req
u
st with
out
u
s
ing pa
sswo
rd
verificatio
n
table
and allo
ws
valid use
r
to use a ne
w fresh pa
ssword at firs
t
login attempt to ensure
that, user’s login
password o
n
l
y
kno
w
n
by h
i
mself. To
a
c
hieve thi
s
g
o
a
l we o
n
ly u
s
e ha
sh
fun
c
tion a
nd Bit
wi
se
XOR ope
rati
on.
Th
en we
sho
w
th
at,
o
u
r schem
e
e
n
com
p
a
s
ses variou
s se
cu
rity
attributes and
withsta
nd vari
ous atta
cks.
The re
st of this pape
r is organi
zed a
s
follows:
review
and se
cu
rity analysi
s
of Li et al’s
scheme
in
se
ction
s
2
a
nd
3 respe
c
tively. Then,
revie
w
of
ou
r
pro
p
o
se
d
schem
e
and
its security
analysi
s
in section
s
4 an
d 5 respe
c
tively. Finally,
perfo
rman
ce
and con
c
lusi
on pro
d
u
c
ed
in
se
ction
s
6 an
d 7, respectiv
e
ly. Table 1
Shows the not
ation used through thi
s
pap
er.
Table 1. The
notation
s
use
d
in this pap
e
r
.
U The
user
S
The authe
ntication server
The identit
y
of
U
Tempor
ar
y passw
o
r
d of
U
The login password of U
Bio
The biometric of
U
x
The master secr
et ke
y
of S
T
The timestamp
∆
The ma
ximum tr
ansmission delay
,
T
w
o
large prime numbers
The ring of inte
g
e
rs modulo
∗
The multiplicative group of
.
Cr
y
p
togra
phic one wa
y
h
a
sh funct
i
on
⨁
Bitw
ise XOR o
p
e
r
ation
||
The message co
ncatenation oper
ator
Secure channel
Public channel
2. Rev
i
e
w
of Li et al’s Scheme
In 2013, Li e
t
al propo
sed
their authe
n
t
icat
ion sch
e
m
e [16] as a
n
improvem
e
n
t over
Che
n
et al’s schem
e [15]. Li et al’s sc
he
me con
s
i
s
ts o
f
four pha
ses
as follo
ws:
Regi
stratio
n
Login
Authenticatio
n
Passwo
rd ch
ange
At the be
gin
n
ing, two la
rge p
r
ime
nu
mbers
p and
q sel
e
cted
b
y
the sever such
that,
p=2
q
+1. The
n
, the serve
r
cho
o
ses a p
r
oper o
n
e
-
way cryptog
r
ap
hi
c ha
sh fun
c
tion.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
Lightweight Com
m
unication Ove
r
he
ad
Authenticatio
n Schem
e Using Sm
art Card
(Songfe
ng Lu)
599
2.1. Registra
tion Phase
Step 1.
Use
r
U sele
cts hi
s/
her id
entity IDu a
nd logi
n
password P
W
u. Th
en, su
bmits them to
th
e
serve
r
S via secu
re chan
ne
l.
Step 2.
S
comp
ut
es
se
curit
y
pa
ram
e
t
e
rs t
o
b
e
s
t
ored in smart c
a
rd, suc
h
that, Au =
h(IDu||PWu)
PW
u
m
od p, Bu = h(I
D
u)
(x
+P
W
u
)
mod p.
Step 3.
S stores
{Au, Bu, h(.), p, q} on a sma
r
t ca
rd an
d issue
s
it to
U via se
cure cha
nnel.
2.2. Login Phase
Step 1.
U in
serts hi
s/he
r smart ca
rd into
a prope
r card read
er, an
d
inputs hi
s / her IDu, PWu.
Step 2.
The
s
m
art c
a
rd com
putes
Au’ =
h(IDu||PWu)
PW
u
mod p.
Then comp
are it with alre
ady
store
d
Au. If they are
not
match
ed, se
ssi
on te
rmina
t
ed, sin
c
e th
e ente
r
ed I
D
u or P
W
u
were
inco
rrect. On
the cont
rary, if Au’ equals to
Au, the smart ca
rd pe
rfo
r
ms n
e
xt step
.
Step 3.
Ra
nd
om numb
e
r
α∈
∗
choo
se by a smart ca
rd. Th
en com
pute
s
:
Cu
=Bu/ h(IDu
)
PW
u
mod p,
Du
= h(IDu)
α
mod p,
Mu=
h(IDu||Cu|| Du||Tu),
where T
u
is the
current time
stamp of U.
Step 4.
The smart ca
rd
sen
d
s {IDu, Du, Mu, Tu} to S as logi
n req
u
e
st me
ssage.
2.3. Auth
enti
cation Pha
s
e
Step 1.
Upon
receiving U’
s login req
u
e
s
t
message, S validates IDu and ch
eck Tu’
– Tu
∆
T,
whe
r
e Tu’ i
s
the cu
rrent S’s timestam
p. S reject
s logi
n requ
est if either or b
o
th a
r
e invalid.
Step 2.
S co
mputes:
C
u
’ =
h(
ID
u)
x
mod p,
Mu’=
h(IDu||
C
u’||Du||Tu)
Step 3.
S
co
mpares
co
mp
uted Mu’
with
re
ceived M
u
,
if they are e
qual, U i
s
a
u
thenticated a
n
d
login re
que
st is acce
pted b
y
S. Otherwise, S rejects lo
gin req
u
e
s
t.
Step 4.
Ran
d
o
m
num
be
r
∈
∗
ch
oo
se
s by
S. Then, com
putes V
u
=
h(IDu)
β
m
od p,
SK=Du
β
mod p , whe
r
e SK is the share
d
se
ssio
n key.
Step 5. S computes
Ms=
h(IDu||
C
u’||Vu||SK||Ts) wher
e T
s
is the
current S’s timestam
p . Then,
{IDu, Vu, Ms
, Ts
}
s
ent to U
by S
as a mutual authe
ntication messa
g
e
.
Step 6.
Upo
n
receivin
g the
mutual authe
ntication me
ssag
e, U validates IDu a
nd
che
c
ks T
s
’ – Ts
∆
T whe
r
e T
s
’ i
s
the current
timestamp
of U. if ei
ther o
r
both are inval
i
d, U termin
ates
se
ssio
n
.
Otherwise, U
contin
ue to n
e
xt step.
Step 7.
U co
mputes:
SK’ =
Vu
α
mo
d p ,
Ms
’ =
h(IDu||Cu||Vu||SK’||
Ts
), U c
o
mp
ares
Ms
’
with the received Ms
. if they
are
equal , S
is
authenti
c
ated
and m
u
tual
a
u
thenticat
ion
achi
eved. On
the contra
ry,
the sessio
n i
s
terminated
by
U. At the end, both of U an
d
S shared a
se
ssi
on key SK= h(IDu)
α
β
mod p.
2.4. Pass
w
o
r
d
Chang
e
Phase
U ca
n ch
ang
e his/he
r logi
n password PWu a
s
follows:
Step 1.
U in
serts a
sma
r
t card into a p
r
o
per card rea
d
e
r. Then, inp
u
ts his/ he
r
IDu, PWu.
Step 2.
Th
e smart card
co
mputes A
u
*
=h(IDu||PWu)
PW
u
mod
p and
comp
ares it
with sto
r
ed A
u
. If
they are
not
equal, the
re
que
st is
reje
cted.
Otherwi
se. U in
puts
a
new pa
sswo
rd PWne
w a
nd
contin
ue to n
e
xt step.
Step 3.
A sm
art ca
rd comp
utes
Au_new
= h(IDu|| PWne
w)
P
W
new
mod p,
Bu_ne
w = Bu
. h(IDu)
P
W
new
/ h(IDu)
PW
u
mod p.
Step 4.
A sm
art ca
rd repla
c
e
s
both Au, Bu with Au_n
ew, Bu_ne
w resp
ectively.
3. Cr
y
p
tanaly
s
i
s of Li et al’s Scheme
In this sectio
n, we a
nalysi
s
Li et al’
s
sc
heme.
We
sh
ow that, thei
r scheme
suff
er fro
m
forge
r
y and u
s
er & serve
r
imperso
nation
attacks.
3.1. Forger
y
Attac
k
s
Suppo
se an
attacker inte
rcept U’
s valid
login me
ssa
ge <IDu, Du,
Mu, Tu>, an
attacker
can
ea
sily a
c
hieves U’
s id
entity IDu
wh
ich
se
nt
in a
plain f
o
rm.
Since, S
doe
s n
o
t che
c
k
U’s
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
1, No. 3, March 20
16 : 597 – 606
600
identity before pro
c
e
ssi
ng
regist
ration
reque
s
t, an attacker
can
send both inte
rce
p
ted IDu
and
attacker’
s
pa
sswo
rd PW*
< IDu, PW*> to S
as a regi
stratio
n
reque
st. S comp
utes Au
*=
h(IDu||PWu*)
PW
u
*
mod p,
and Bu*= h
(
IDu)
(x
+P
W
u
*)
mod p, S stores the se
cu
rity parameters
{Au*,Bu*, h
(
.), p, q}
on
the
sma
r
t
card
a
nd i
s
sue
s
it t
o
attacke
r
. T
hen, a
n
attacker a
c
hi
eves
U’s
se
cret
key
C
u
,
whe
r
e
Cu
=
B
u
*/
h(I
D
u)
PW
u
*
mod
p
=
h(IDu
)
x
mod
p. intuitively, an atta
cker
u
s
ing
intercepted I
D
u ,and
com
puted U’
s secret key Cu
ca
n easily forg
e
a valid login messag
e.
3.2. User Imperson
ation
Attac
k
s
An attacke
r can masque
ra
des a
s
a legitimate
U. since, he/she can
easily achi
eves U’
s
identity IDu and
se
cret
key Cu a
s
m
entione
d in
forge
r
y attacks sectio
n
(3.
1
.). An attacker
sele
ct
s ra
ndo
m
numb
e
r
r∈
∗
and
cal
c
ulate
s
Du*
=
h
(
IDu
)
r
mo
d p, a
nd Mu*
=
h(I
D
u||Cu||
Du*||Tu*
), wh
ere Tu* i
s
attacker’
s
curre
n
t timest
amp.
Then, se
nds
<IDu, Du*, Mu*,Tu*> to S.
S verifies attacker’
s
logi
n messag
e, the verification h
o
lds, sin
c
e b
o
th Tu* and Mu* are
valid. Then,
S selects
∈
∗
a
nd calculate
s
Vu = h(IDu)
β
mod p.
S sends the
mutual
authenti
c
atio
n messag
e to U. Again, an
atta
cke
r intercept
s the me
ssage
<IDu,
Vu, Ms, Ts>
and
comp
utes SK
= (Vu)
r
mo
d p = (IDu)
r
β
mo
d p. From the analysis a
b
o
v
e, we sho
w
that, an attacker
can
pe
rform
use
r
im
perso
nation
attacks. Fu
rthe
rmo
r
e, the
se
ssi
o
n
key SK al
so a
c
hieve
d
b
y
an
attac
k
er.
3.3. Ser
v
er Impersona
tio
n
Attack
s
An attacker can perfo
rm
server imp
e
rsonati
on atta
cks u
s
in
g U’
s identity IDu and se
cret
para
m
eter Cu=
h
(
IDu
)
x
mod p a
s
mentione
d in forge
r
y attacks se
ction
(3.
1
). An attacker
intercept U’s
login messa
g
e
<IDu, Du, Mu, Tu> and
generate
s
ra
ndom r
∈
∗
and compute
s
SK*=
(Du)
r
mod p; V
u
*
=
h
(
IDu
)
r
m
od p; T
s
*
i
s
atta
cker
current time
stamp; an
d M
s
*=
h(IDu||
C
u||Vu*||SK*||Ts*). Then, an att
a
cker s
ends
mutual authentication
message {I
Du, V
u
*,
Ms*, T
s
*}
to
U. Upon
re
ceiving atta
cker’s me
ssag
e
,
U valid
ates IDu
and
Ts*
,
sin
c
e
both
are
valid, the verification h
o
ld
s. Then,
U
compute
s
SK’=(Vu*
)
α
mod
p whi
c
h
equ
als to SK*; Ms’=
h(IDu||
C
u||Vu*||SK’||Ts
*
). Thus
, Ms
’ is
equal to Ms
*.
This b
r
ief di
scu
ssi
on
sho
w
s that, Li et
al’s
scheme suffers
fro
m
serve
r
imp
e
rson
ation
attacks an
d session
key ca
n be ea
sily ca
lculate
d
by an attacker.
4. The Propo
sed Scheme
In this sect
ion, we p
r
opo
se
our
se
cure lig
ht
weig
ht com
m
unication
overhe
ad
authenti
c
atio
n schem
e ba
sed
user’
s
pa
sswo
rd a
nd b
i
ometri
c with
se
ssi
on
key a
g
ree
m
ent u
s
i
ng
sma
r
t ca
rd. O
u
r propo
se
d schem
e co
nsi
s
t of four phases a
s
follows:
Regi
stratio
n
pha
se
Login
p
h
a
s
e
Authenticatio
n
pha
se
Passwo
rd
ch
ange
p
h
a
s
e
In the beginni
ng of our p
r
o
posed sch
e
m
e
, serve
r
S select
s key x as its secret
key with
prop
er len
g
th
like 1024 bit
s
, and on
e way cryptog
r
ap
hic ha
sh fun
c
tion h(.):{0,1
}
*
{0,1}
n
.
The regi
strati
on, and l
ogin
& authenti
c
a
t
ion pha
se
s
of our
schem
e sh
own in F
i
gure
s
1
and
2
r
e
spec
tively.
4.1. Registra
tion
Step 1
. U ch
ooses hi
s/her identity IDu,
tempo
r
a
r
y p
a
ssword
TP
Wu
and
rand
om n
u
mbe
r
b
.
U
comp
utes EI
D=h(IDu||b). Then, se
nd
s regist
ra
tion
reque
st <EID, TPWu
> to S via secure
cha
nnel.
Step 2
. Upo
n
re
ceiving
registration m
e
ssag
e, S
c
o
mputes
SI
D=h(EID || x). S c
h
eck
s
SID
and
reje
cts t
h
is re
que
st if it is a
l
ready
re
giste
r
ed to
p
r
even
t dupli
c
ated
registration fo
r sa
me id
entity.
Otherwise, S
upd
ates re
gistered
use
r
li
s
t
with S
I
D. Then, computes
Au=
S
ID
⨁
TP
Wu,
Bu=
h
(SID
⨁
EID). S sto
r
e
d
se
cret pa
ra
meters {Au,
Bu,
h(.)} into
s
m
art card and iss
u
es it to U
via secure
ch
annel.
Step 3
.
U in
sert
a sm
art
card into a
p
r
ope
r
card re
ader
and i
n
p
u
ts IDu, TP
Wu. a
sma
r
t card
c
o
mputes
EI
D=h(IDu||b), SID =
Au
⨁
TPWu , and
comp
ares Bu
’= h(SID
⨁
EID) with Bu w
h
ich
store
d
in sm
a
r
t card. If Bu’
not equal to
Bu, U termina
t
es the se
ssio
n.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
Lightweight Com
m
unication Ove
r
he
ad
Authenticatio
n Schem
e Using Sm
art Card
(Songfe
ng Lu)
601
Step 4
. U ch
ooses an
d
submits hi
s/he
r fre
s
h
logi
n
password P
W
u
and
imp
r
i
n
ts bi
ometri
c Bio
like fin
ger print. A sma
r
t ca
rd
co
mpu
t
es Au’
=
Au
⨁
TPWu
⨁
h(P
W
u||Bio), Bu’=
h(S
I
D ||
h(PWu||Bio)).
Then, replaces Au, Bu wit
h
Au’, Bu
’ respectively and stores
b i
n
to smart card.
At
the end of su
ccessful re
gistration
process, se
cret
parameters {Au,
Bu, h(.) b} st
ored in a
sm
art
car
d
.
4.2. Login Phase
Step 1
. U in
sert
s
his/he
r
sma
r
t card i
n
to a
pro
p
e
r
ca
rd
re
ade
r, and
inp
u
ts
U’s ide
n
tity IDu,
password P
W
u, a
n
d
im
print
biomet
ric Bio.
The
n
, a
sma
r
t
ca
rd
comp
utes SI
D=Au
⨁
h(PWu||Bio),
Bu’= h(SID ||
h(P
W
u
||Bio)) and checks
whether B
u
’ i
s
equal to st
ored Bu, if they
are e
qual, session h
o
ld
s. Otherwise, se
ssi
on
term
inated be
ca
u
s
e at lea
s
t one of ente
r
ed
para
m
eters {I
Du, PWu, Bio
}
is incorre
c
t.
Step 2
. Smart card g
ene
ra
tes ra
ndom
α
, and com
put
es EID=h(I
D
u
||b) , M
1
=
h
(SID||Tu)
⨁
α
, M
2
=
h(M
1
||
α
).
The
n
, sm
art
ca
rd send
s l
ogi
n me
ssage
<EID, M
1
, M
2
, Tu
>
to S.
Where Tu is U’s
c
u
rrent times
t
amp.
4.3. Auth
enti
cation Pha
s
e
Step 1
.
Up
o
n
re
ceivin
g l
ogin m
e
ssa
g
e
, S ch
ecks t
he validity of
SID=h
(
EID |
|
x) co
mpa
r
e
d
to
both regi
stered u
s
e
r
data
base an
d a
c
tive
use
r
li
st. Then, valid
ates T
u
’- T
u
∆
T, whe
r
e
Tu’ i
s
S’s current ti
mestam
p at
receivin
g logi
n
messa
ge. If
either
or
both
are
invalid, t
he logi
n atte
mp
t
is rejected.
Step 2
. S co
mputes,
α
= M
1
⨁
h(SID||Tu) , M
2
’= h(M
1
||
α
). If M
2
’ is e
qual to M
2
,
se
ssi
on h
o
ld
s a
n
d
U is auth
enticated. Otherwi
se, se
ssion te
rminate
d
.
Step 3
. S
g
enerates ran
dom
β
, and comp
utes
M
3
=
h
(SI
D
||Ts
)
⨁
β
, wh
ere
Ts i
s
S’
s
current
timestamp,
M
4
=h(
M
3
||
β
), SK=
h(
α
||
β
).
Then, S
sen
d
s
mutu
al auth
enticatio
n me
ssage
< M
3
, M
4
,
Ts
>
to U.
Step 4
. Upo
n
receiving
mutual authe
ntication me
ssage at time Ts’, Smart
card
che
ck the
validity of Ts
Ts’ – Ts
∆
T, if i
t
is invalid, smart card term
inates sessi
on. Otherwi
se, smart card
comp
utes
β
= M
3
⨁
h(SID||Ts), M
4
’= h(M
3
||
β
). If
M
4
’ n
o
t equal to M
4
, sessi
on terminated. On the
contrary, if M
4
’ is eq
ual to
M
4
, S is a
u
thenticated a
nd mutu
al au
thenticatio
n a
c
hieve
d
. The
n
,
sma
r
t ca
rd
compute
s
SK=h(
α
||
β
). At the end
of succe
ssful
mu
tu
al authe
nticat
ion, both
use
r
U
and server S
share the same se
ssion
key SK=h(
α
||
β
), whe
r
e
α
and
β
have random valu
e
for
each se
ssion.
4.4. Pass
w
o
r
d
Chang
e
Phase
Whe
never
au
thorized user want
s
to cha
nge hi
s/he
r
p
a
ssword
PWu to a
ne
w p
a
s
swo
r
d P
W
u
ne
w
,
this
phas
e
is
invok
e
d.
Step 1
. U in
serts hi
s/he
r smart ca
rd int
o
a pro
per
card read
er, a
nd input
s ide
n
tity IDu, current
password PWu, impri
n
ts biometri
c Bio.
Then, Smart ca
rd com
putes SID=A
u
⨁
h(PWu||
B
io),
Bu’=
h(SID||h(PWu||Bio)). If
Bu’ is
not equal to
Bu
whic
h
s
t
ored in smart card, pas
s
word
c
h
ange
is reje
cted d
u
e
to invalid informatio
n. Otherwi
se
sma
r
t card co
ntinue
to next step.
Step 2
. U inp
u
ts hi
s/he
r n
e
w
p
a
ssword
PWu
new
, Smart card
comp
utes A
u
’=Au
⨁
h(P
W
u||Bio)
⨁
h(PWu
new
|
|Bi
o), Bu’=
h(SID||h(PWu
new
||B
io)).
Step 3
. Smart c
a
rd replaces
Au, Bu with Au’, Bu
’ respectively. Which
su
cc
es
sf
ully
complet
e
s
password ch
ange at U’
s si
de witho
u
t ne
ed to S’s assi
stan
ce.
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
1, No. 3, March 20
16 : 597 – 606
602
User U
Ser
v
er
S
Cho
o
ses IDu, TPWu, b
choose
s
x, h(.)
EID=
h(IDu||b)
<
EID, TP
Wu >
SID=
h(EID || x)
Che
c
ks S
I
D
Au=
S
ID
⨁
TPW
u
Bu=
h
(SID
⨁
EID)
Smart c
a
rd
{Au,
Bu, h(.)}
Smart c
a
rd
SID =
Au
⨁
TPWu
Verifies Bu
= ? h(SID
⨁
EID)
Cho
o
ses PWu, imprints Bi
o
Au’=
Au
⨁
TPWu
⨁
h(P
W
u||Bio)
Bu’=
h(SID || h(PWu||Bio))
Replaces
Au,
Bu with Au’,
Bu’ respec
tively
Store b into smart ca
rd
Figure 1. Reg
i
stration p
h
a
s
e of propo
se
d
sch
eme
User U
Ser
v
er
S
Inputs IDu, P
W
u, impri
n
ts
Bio
SID=
Au
⨁
h(PWu||Bio),
Bu=
?
h(SI
D || h(PWu||Bio))
EID=
h(IDu||b)
Gene
rate
s ra
ndom
α
M
1
=
h
(SID||Tu)
⨁
α
M
2
= h(M
1
||
α
)
<
E
ID, M
1
, M
2
, Tu >
Verifies
Tu, SID=h(EID || x)
α
= M
1
⨁
h(SID||Tu)
M
2
= ? h(M
1
||
α
).
Generate
s
rand
om
β
M
3
=
h
(SI
D
||Ts)
⨁
β
M
4
=h(M
3
||
β
)
SK
=
h
(
α
||
β
).
<
M
3
, M
4
, Ts
>
Verifies
Ts
β
= M
3
⨁
h(SID||Ts
)
M
4
= ? h(M
3
||
β
).
SK=
h(
α
||
β
).
Shared
se
ssi
on key SK=h
(
α
||
β
).
Figure 2. Logi
n and Authen
ticati
on ph
ases of propo
se
d scheme
5. Securit
y
A
n
aly
s
is of Pr
oposed Sch
e
me
In this se
ctio
n, we analy
s
is the se
cu
ri
ty
of our pro
posed light
weight authe
ntication
scheme, with
a brief discu
s
sion.
5.1. User An
on
y
m
it
y
To p
r
ote
c
t user a
nonymity in the
pro
p
o
s
ed
sche
me,
plain text
U’
s id
entity IDu
neithe
r
saved
in
sma
r
t ca
rd
no
r tra
n
smitted
over ch
annel
thro
ugh lo
gin
me
ssage. In
stea
d, ha
she
d
val
ue
of con
c
ate
nat
ed IDu
and p
a
ram
e
ter b,
say EID, s
ent
to S. an attacker h
a
s to
b
r
ea
k on
e way
cryptog
r
a
phi
c hash fu
nctio
n
and h
e
mu
st kn
ow b to
extract IDu. I
n
tuitively, an attacker h
a
s
no
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
Lightweight Com
m
unication Ove
r
he
ad
Authenticatio
n Schem
e Using Sm
art Card
(Songfe
ng Lu)
603
way to extra
c
t U’s i
dentity by con
s
id
eri
n
g one
way property of h
a
sh functio
n
. So, our
propo
sed
scheme can achi
eve
user anonymity.
5.2. Pass
w
o
r
d
Guessing
Attac
k
s
Our
propo
se
d
sche
me ca
n withsta
nd offline
g
u
e
ssi
ng
attacks. T
o
prove that, a
n
a
ttacke
r
who
attempts to gue
ss
U’
s logi
n p
a
ssword, c
ann
ot verify gue
ssed pa
ssword
from Au
=SI
D
⨁
h(PWu||Bio); Bu=
h(SID||h(PWu||Bio)); and
i
n
te
rcept
ed login m
e
ssage,
because SID and Bi
o
are requi
red.
To comp
ute SID, secret param
eter x (1
024 bi
ts) is required which is only kno
w
n by S.
Furthe
rmo
r
e,
U’s Biometri
c value is u
n
kn
own
to the attacker a
nd only auth
o
rized u
s
er
can
imprint
s
a vali
d biometri
c. T
herefo
r
e, ou
r
prop
os
ed
sch
e
me can resi
st off
line pa
ssword gu
essin
g
at
t
a
ck
s.
5.3. Stolen Smart Ca
rd Attack
s
Our p
r
op
os
e
d
sc
heme
ca
n re
sist
st
ol
e
n
sma
r
t
ca
rd
at
t
a
ck.
S
u
p
p
o
se a
n
at
t
a
c
k
e
r ex
t
r
a
c
t
all paramete
r
s sto
r
ed i
n
th
e stole
n
sm
art card
{Au,
Bu, b} by po
wer an
alysi
s
at
tack [1
7] Kocher
et al in 1999. Then, the attacker trie
s to initiate
a valid login messa
ge. An attacker uses hi
s/ her
curre
n
t time
stamp T
u
*. Althoug
h, he/
sh
e cann
ot
succe
ssfully com
putes
EID = h(IDu||b
) with
out
kno
w
in
g
U’s i
dentity IDu
which
neith
er stored
in
sm
art ca
rd
no
r tra
n
smitted
over ch
ann
el. In t
he
same
way, computes M1=h(SI
D
||Tu*)
⨁
α
is infeasible
without kno
w
in
g SID. To comp
ute SID
an attacke
r
e
i
ther comput
es SID= Au
⨁
h(PWu||Bio) or SID
=
h(EID || x). Obvious
l
y, he/s
he
can
not gen
erates U’
s pa
sswor
d and bi
o
m
etric info
rm
ation.
From the di
scussion a
bove
,
we prove th
at,
our pro
p
o
s
e sch
e
me
can re
si
st stol
en sm
art
c
a
rd attacks
.
5.4. Repla
y
Attac
k
s
Our
pro
p
o
s
e
d
sche
me forbids
repl
ay a
ttacks u
s
ing t
i
mestam
p T.
sup
p
o
s
e a
n
attacker
tries to resend prev
iously i
n
tercepted login me
ssage,
this attempt will
be
rejected by the
server
S after che
cking me
ssage
fresh
n
e
ss b
a
se
d on Tu. i
f
the attacke
r repla
c
e
s
the
U’s time
sta
m
p
with attacke
r
’
s
timesta
m
p
Tu*, this attemp
t also
rejecte
d
by S base
d
on
condition M
2
’=?
h(M1||
α
) =
h(h(SID||Tu)
⨁
α
)||
α
). The ot
her p
o
ssible
cha
n
ce for th
e attacker i
s
to gene
rate b
o
th
Tu*an
d
M1*
=
h (SID||Tu*)
⨁
α
. This
attempt also rej
e
cted
be
cau
s
e there i
s
no
way to co
mp
ute
valid SID without kno
w
ing
U’s p
a
ra
mete
rs {IDu, PWu,
b, x}. This brief discussio
n
sho
w
s that, our
prop
osed sch
e
me forbi
d
s replay se
ssion
attacks.
5.5. Mutual Authen
ticati
on
Our p
r
o
p
o
s
ed
scheme
achi
eves mutu
al
authenti
c
atio
n. Both use
r
and
serve
r
p
r
ove their
legitimacy to
each othe
r whe
r
e M
2
, U’s tim
e
sta
m
p and
M4,
S’s timesta
m
p are u
s
e
d
to
authenti
c
ate use
r
to serve
r
, serve
r
to user
re
sp
e
c
tively as mentio
ned in authe
ntication ph
a
s
e in
se
ction (4.3).
Furthe
rmo
r
e,
only authori
z
ed user
a
nd
serve
r
can p
r
ove their aut
henticity to e
a
ch
other.
5.6. Forger
y
Attac
k
s
An attacke
r h
a
s to forge a
valid login messag
e {EID,M1,M2,Tu
}
which ca
n b
e
verified
and a
c
cepte
d
by the aut
hentication
server, a
n
a
ttacker
ha
s n
o
way to ext
r
act o
r
g
ene
rate
para
m
eters
{IDu, x, b} to
compute
M1
=h(SID||Tu)
⨁
α
=
h(h(EI
D|| x)||Tu)
⨁
α
=
h(h(h(I
D
u||b) ||
x)||Tu)
⨁
α
. I
n
tuitively, our s
c
h
eme res
i
s
t
forgery attac
k
s
.
5.7. Kno
w
n
Ke
y
Secrec
y
Our p
r
op
ose
d
schem
e me
ets known ke
y se
cre
c
y pro
perty. If sessi
on key SK=
h
(
α
||
β
) i
s
comp
romi
se
d
by an attacker,
previo
usl
y
captu
r
ed
communi
catio
n
ca
nnot b
e
reveale
d
du
e
to
rand
om
α
and
β
. Since bo
th have new
rand
om value
in each
ne
w se
ssi
on an
d there i
s
no
wa
y
to derive pre
v
ious session
key fr
om the
current key. Hen
c
e, there is no way to
reveal p
r
evio
us
comm
uni
cati
ons. Thi
s
b
r
i
e
f discu
ssio
n
sho
w
s that, our p
r
op
ose
d
schem
e re
sist
s kno
w
n
key
se
cre
c
y
at
t
a
c
ks.
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
1, No. 3, March 20
16 : 597 – 606
604
5.8. Session Ke
y
Agreement
In ou
r p
r
op
o
s
ed
sch
e
me
durin
g a
u
the
n
tication
ph
a
s
e, u
s
e
r
and
se
rver comp
ute thei
r
se
ssi
on k
e
y
S
K
=
h(
α
||
β
). Furthe
rmo
r
e
,
M2’=? h
(
M1
||
α
), M4’=? h(M3||
β
) these
two co
nditio
n
s
are u
s
e
d
to verify the esta
blish
ed sessi
on key.
Thi
s
clea
rly sho
w
s that, our sch
e
me a
c
hieve
s
se
ssi
on key agree
ment.
5.9. Insider Attac
k
s
Our p
r
opo
se
d sch
eme p
r
events insi
de
r attack,
si
nc
e sec
u
rity
pa
ramete
rs {I
D
u
, PWu,
Bio, b, x}
cannot be obta
i
ned by an attacker. Fo
r instance, U’
s biometri
c i
m
print
s
only by
authori
z
e
d
u
s
er a
s
well a
s
login pa
ssword. Be
side
s,
serve
r
se
cre
t
key x is onl
y kno
w
n to t
h
e
serve
r
. Furth
e
rmo
r
e, all secret value
s
prote
c
ted u
s
ing
crypto
graphi
c ha
sh functio
n
. With
out
kno
w
in
g these paramete
r
s, an atta
cker
can
not pe
rform insid
e
r atta
cks. Thi
s
sho
w
s
our
sche
me
resi
st
s in
sid
e
r
at
t
a
ck
s.
5.10. Friendly
User Passw
o
r
d
Ch
ang
e
The
user i
s
free
to
cha
n
g
e
hi
s/he
r lo
gi
n pa
ssword
without
nee
d
to
comm
uni
c
ate th
e
serve
r
. Efficie
n
t and
secure
step
s
are u
s
ed to
han
dle
password
ch
ange
a
s
me
ntioned
in
se
cti
o
n
(4.4). Furth
e
rmore, wron
g entere
d
password ca
n b
e
dete
c
ted
qui
ckly. O
n
th
e
other ha
nd,
an
attacker ha
s
no
way to
ch
ange
u
s
e
r
’s
password,
si
nce
he/
she
h
a
s
no
sufficie
n
t inform
atio
n to
perfo
rm thi
s
cha
nge. T
h
us, ou
r p
r
o
p
o
se
d sch
e
m
e
achieve
s
f
r
iendly
and
se
curely u
s
e
r
’s
password ch
ange.
6. Performan
ce Analy
s
is
In this se
ction. We eval
uate our
pro
posed sch
e
m
e and
co
mpare it with related
scheme
s
, Xu
et al
[12]; S
ong [1
3]; So
od et
al [1
4]; Ch
en
et al
[
1
5]; Li
et al
[16]. We fo
cu
s o
n
Login a
nd a
u
thentication
phases
sin
c
e both are
more freque
nt and req
u
ired in ea
ch l
o
gin
attempt. The comp
ari
s
o
n
b
a
se
d on
com
m
unication o
v
erhea
d
and
comp
utation
compl
e
xity.
We
assume th
at, the output of hash fun
c
tion is 160
bits; timesta
m
p 32 bits;
use
r
’s id
ent
i
ty,
password, bi
ometri
c, an
d
rand
om
non
ce a
r
e
160
bi
t
s
; serve
r
se
cret key
x
i
s
1
024 bits to avoid
gue
ssi
ng attacks. Accordin
g to this assu
mption, we
fo
und that, sing
le login attempt in Li et al’s
scheme
re
q
u
ired
275
2 bi
ts as commu
nicatio
n
overhead i
n
two
messag
es, first me
sseag
e
for
login re
que
st
and scond o
ne for mutual
verifica
tion. Whe
r
ea
s, ou
r propo
se
d scheme requi
re
d
only 864
bi
ts co
mmuni
cation
overh
ead u
nde
r
same
co
ndit
i
ons. Fig
u
re
3 sh
ows
the
comm
uni
cati
on ove
r
he
ad
com
p
a
r
iso
n
of rel
a
ted
schem
es.
Furt
herm
o
re, th
e
com
p
a
r
iso
n
o
f
comp
utation
compl
e
xity of various
op
eration
s
us
ed
in
me
n
t
ione
d
sc
he
mes s
u
c
h
as
h
a
s
h
function; exp
onential; mult
iplicatio
n/ division; an
d exclusive XOR
o
peratio
ns a
r
e
sho
w
n in tab
l
e
2. To a
c
hi
eve lo
we
st co
mputation ti
me comp
l
e
xity, our p
r
op
ose
d
schem
e u
s
e
s
o
n
ly ha
sh
function a
nd
exclu
s
ive XOR ope
ration
s.
Figure 3. Co
mmuni
cation
overhe
ad co
mpari
s
o
n
bet
wee
n
pro
p
o
s
ed and relate
d scheme
s
2752
2400
864
1728
2752
864
0
1000
2000
3000
No.
of
bits
required
Schemes
Communica
tion
ov
erhea
d
co
m
p
a
r
is
o
n
Xu
et.
al.
Sood
et.
al.
Song
Chen
et.
al.
Li
et.
al.
Our
sc
heme
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
Lightweight Com
m
unication Ove
r
he
ad
Authenticatio
n Schem
e Using Sm
art Card
(Songfe
ng Lu)
605
Table 2. Co
m
putation cost
comp
ari
s
o
n
s
betwe
en prop
ose
d
and rela
ted scheme
s
Schem
e
L
ogin phase
Authentication pha
se
T
o
tal
Xu et al
3T
2
T
4T
2
T
7T
4
T
Sood et al
3T
3
T
2
T
3T
2
T
1
T
6T
5
T
3
T
Song
2T
1
T
6T
1
T
1
T
8T
1
T
2
T
Chen et al
2T
2
T
2
T
6T
1
T
1
T
8T
3
T
3
T
Li et
al
4
3
1
5
4
9
7
1
Our sche
m
e
5T
2
T
9T
3
T
14T
5
T
T
: complexit
y
of h
a
sh function
T
: complexit
y
of e
x
ponential ope
rat
i
on
T
: complexit
y
of
multiplicat
ion/division operation
T
: complexit
y
of
sy
mm
etric encr
y
ption-decr
y
ption
operation
T
: complexit
y
of e
x
clusive XOR op
eration
Additionaly, Table 3. Briefly sho
w
s the
co
mpari
s
o
n
re
sults for securi
ty attributes o
f
our pro
p
o
s
e
d
and rel
a
ted schem
es.
This pe
rform
ance analy
s
is sho
w
s that, our p
r
op
osed
sch
eme en
compa
s
ses th
e desi
r
ed
se
curity
attributes a
n
d
resi
st wide
spectrum of m
a
licio
us atta
cks. Be
side
s, our p
r
op
osed
sch
eme is
efficient and li
ghtwei
ght co
mmuni
cation
overhe
ad.
Th
us, it is se
cu
re and mo
re suitable to
pra
c
tical u
s
e
comp
ared to other related
scheme
s
.
Table 3. Security attribute
s
co
mpa
r
ison
betwee
n
pro
posed an
d rel
a
ted schem
e
s
Security attributes
Xu et al
Song
Sood et al
Chen et al
Li et al
O
u
r
sch
em
e
Resist smar
t car
d
stolen attacks
Y
e
s
No
Y
e
s
Y
e
s
Y
e
s
Y
e
s
Re
s
i
s
t
f
o
rg
e
r
y
a
t
t
a
c
k
s
No
Ye
s
Ye
s
Ye
s
No
Ye
s
Resist impersonation attacks
No
No
No
No
No
Y
e
s
Resist insider attacks
No
No
No
No
No
Yes
Resist offline passw
or
d guessing attacks
No
No
No
No
No
Y
e
s
Achieve mutual authentication
No
Y
e
s
No
Y
e
s
Y
e
s
Y
e
s
Support session-key agre
e
ment
Y
e
s
Y
e
s
No
Y
e
s
Y
e
s
Y
e
s
Quickly
det
ect
w
r
ong password
No
No
No
No
Y
e
s
Y
e
s
Friendl
y
p
a
ssw
o
r
d change
No
No
No
No
Y
e
s
Y
e
s
Using temporar
y
registration passw
o
r
d
No
No
No
No
No
Y
e
s
Prevent duplicated registration
No
No
No
No
No
Y
e
s
7. Conclusio
n
Comm
uni
cati
on re
sou
r
ce
s is a cru
c
ial i
s
sue to be consi
dered in
mode
rn auth
enticatio
n
proto
c
ol
s. In this pape
r, we sho
w
mo
re interestin
g
in commu
ni
cation resou
r
ce
s as
well
as
se
curity fun
c
tionality of the pro
p
o
s
ed
authenti
c
atio
n schem
e. We redu
ce
communi
catio
n
and
comp
utation
co
st req
u
ired
to achi
eve secu
re
a
nd m
u
tual auth
ent
ication
betwe
en re
mote u
s
er
and serve
r
. We p
r
op
ose
our secure
Lightwe
i
ght
commu
nication overhea
d authenti
c
at
ion
scheme
usi
n
g sma
r
t card.
Thro
ugh
cry
p
tanalysi
s
a
n
d
perfo
rma
n
ce evaluatio
n
comp
ari
s
o
n
, we
sho
w
that, o
u
r propo
se
d scheme
achi
eves de
si
re
d
security attri
butes a
nd
withstand va
rio
u
s
malicio
us att
a
cks
whi
c
h o
t
her sche
me
s suffe
r from.
Our propo
se
d scheme
re
quire
d only 8
6
4
bits totally communi
catio
n
overh
ead
also
req
u
ires low
com
put
ation co
st
co
mpared to ot
her
related
sch
e
m
es
and
sup
porting
mutu
al authe
nticat
ion an
d
se
ssi
on
key ag
re
e
m
ent u
s
ing
smart
c
a
rd tec
h
nology. Thus
, our sc
heme is
more suit
able f
o
r
pr
ac
tical us
e to secure
r
e
mote ac
cess
over publi
c
e
n
vironm
ent.
Referen
ces
[1]
Yu X, F
a
n
g
JJ
, Z
hang Z
L
. A
Securit
y
Mec
han
ism bas
ed
on Auth
entic
ated Diffie
Hel
l
m
an for W
S
N.
T
E
LKOMNIKA Indon
esi
an Jou
r
nal of Electric
al Eng
i
ne
eri
n
g
.
2013; 1
1
(6): 3
349 - 33
54.
[2]
Lamp
o
rt L. Pa
ss
w
o
rd
auth
e
n
t
ication
w
i
th
in
secure c
o
mmu
nicati
on.
C
o
mmu
n
ic
ations
of
the ACM
.
198
1; 24(1
1
): 770-7
72.
[3]
Chang CC, Wu
T
C
.
Remote p
a
ssw
ord
auth
entic
atio
n w
i
th s
m
art
card
. C
o
mput
ers a
n
d
Di
git
a
l
T
e
chniques. IE
EE Proceed
in
g
s
. 1991; 13
8(3)
: 165-16
8.
[4]
Sun HM. An
efficient remote use
a
u
the
n
tication sc
heme
usin
g smart cards.
IEEE Transactions o
n
Cons
u
m
er Ele
c
tronics
. 200
0; 46(4): 95
8-9
6
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
1, No. 3, March 20
16 : 597 – 606
606
[5]
Ku W
C
, Chen
SM.
W
eakne
sses and impr
oveme
n
ts of an efficient pas
s
w
o
r
d bas
ed r
e
mote user
authe
nticati
on scheme
usi
ng smart
cards.
I
EEE
Transactions on Consum
er
Electronic
s
. 200
4; 5
0
(1):
204-
207.
[6]
Cha
n
CK,
Ch
e
ng
LM. Cr
ypt
a
nal
ysis
of
a r
e
mo
te us
er
auth
enticati
o
n
sche
m
e us
ing
smar
t cards.
IEEE
T
r
ansactio
n
s o
n
Cons
u
m
er El
ectronics
. 20
00
; 46(4): 992-9
9
3
.
[7]
Chie
n HY, Ja
n
JY,
T
s
eng YM. An efficient a
nd pr
ac
tical s
o
l
u
tion to r
e
mote
authe
nticatio
n:
smart card.
Co
mp
uters & Security
. 200
2; 21(4): 37
2-3
7
5
.
[8]
Hsu CL. S
e
cur
i
t
y
of C
h
ie
n et
al.'
s remote
u
s
er auth
enticat
ion sc
heme
us
ing smart car
d
s.
Computer
Standar
ds & Interfaces
. 200
4; 26(3): 167-
16
9.
[9]
H
w
an
g MS, Li
LH. A ne
w
re
mote user
aut
hentic
atio
n sch
eme us
ing sm
art cards.
IEEE Transactions
on Co
nsu
m
er
Electron
ics
. 20
00; 46(1): 2
8
-3
0.
[10]
W
e
i Chi KU,
Cha
ng ST
. Imperso
natio
n attack on
a d
y
n
a
m
ic ID-base
d
remote user
a
u
thentic
atio
n
scheme us
ing
smart cards.
IEICE T
r
ansactio
n
s on Co
mmun
i
catio
n
s
. 200
5; 88(5): 21
65-
21
67.
[11]
Devi T
,
Ganesan R.
Platform-as-a-Servic
e (PaaS):
Model and Sec
u
rit
y
Issues.
TEL
K
OMNIKA
Indon
esi
an Jou
r
nal of Electric
al Eng
i
ne
eri
n
g
.
2015; 1
5
(1): 1
51 – 16
1.
[12]
Xu J, Z
hu W
T
, F
eng DG.
An improv
ed
smart
card ba
sed p
a
ss
w
o
r
d
authe
nticatio
n
scheme
w
i
t
h
prova
b
le sec
u
ri
t
y
.
Co
mp
uter Standar
ds & Interfaces
. 2009; 3
1
(4): 723-
72
8.
[13]
Song R. Adva
nced smart c
a
rd
bas
ed p
a
s
s
w
o
r
d a
u
the
n
t
ication pr
otoc
ol.
Co
mp
uter Standar
ds &
Interfaces.
201
0; 32(5): 32
1-3
25.
[14]
Sood SK, Sarj
e AK, Singh K.
An improv
e
m
e
n
t of Xu et al.'
s aut
he
nticatio
n
sche
m
e us
ing
smart car
d
s
.
Procee
din
g
s of
the
T
h
ird Ann
ual ACM Ba
ng
alor
e Confer
en
ce.
Banga
lor
e
.
201
0.
[15]
Che
n
BL, Ku
o
W
C
, W
uu LC.
Rob
u
st smart-card
-b
ased
rem
o
te user
pass
w
ord a
u
the
n
ticat
i
on sc
hem
e.
Internatio
na
l Journ
a
l of Co
mmu
n
ic
ation Sys
t
ems
. 20
14; 27
(2): 377-3
89.
[16]
Li
X, Ni
u J,
Khurram K
h
a
n
M, Lia
o
J. A
n
en
ha
nce
d
s
m
art card
bas
ed rem
o
te us
er pass
w
o
r
d
authe
nticati
on scheme.
Jour
n
a
l of Netw
ork and Co
mputer A
pplic
atio
ns
. 20
13; 36(5): 1
365
-137
1.
[17]
Kocher P, Jaffe J, Jun B.
Differenti
a
l po
w
e
r an
al
ysis.
In: Advances
in cr
yptol
o
g
y
CRYPT
O99.
Sprin
ger. 19
99
: 388-39
7.
Evaluation Warning : The document was created with Spire.PDF for Python.