CFP last date
20 January 2025
Reseach Article

A Secure SCAM (Smart Card based Authentication Mechanism)

by Ravi Singh Pippal, Rajesh Ahirwar, Shivpratap Singh Kushwah, Pradeep Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 5
Year of Publication: 2013
Authors: Ravi Singh Pippal, Rajesh Ahirwar, Shivpratap Singh Kushwah, Pradeep Yadav
10.5120/12491-8480

Ravi Singh Pippal, Rajesh Ahirwar, Shivpratap Singh Kushwah, Pradeep Yadav . A Secure SCAM (Smart Card based Authentication Mechanism). International Journal of Computer Applications. 72, 5 ( June 2013), 26-31. DOI=10.5120/12491-8480

@article{ 10.5120/12491-8480,
author = { Ravi Singh Pippal, Rajesh Ahirwar, Shivpratap Singh Kushwah, Pradeep Yadav },
title = { A Secure SCAM (Smart Card based Authentication Mechanism) },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 5 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number5/12491-8480/ },
doi = { 10.5120/12491-8480 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:37:08.607488+05:30
%A Ravi Singh Pippal
%A Rajesh Ahirwar
%A Shivpratap Singh Kushwah
%A Pradeep Yadav
%T A Secure SCAM (Smart Card based Authentication Mechanism)
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 5
%P 26-31
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recently, Tsai et al. proposed dynamic ID based smart card authentication scheme. This paper demonstrates that Tsai et al. 's scheme fails to provide early wrong password detection, secure password change and protection against insider attack. To overcome, we propose a secure SCAM (Smart Card based Authentication Mechanism) which keeps all previous merits and achieves security and functionality requirements. The performance of both the schemes has been analyzed in terms of various metrics. Comparing with Tsai et al. 's scheme, our scheme provides higher security with nearly same cost. For network where clock synchronization is tough, nonce based scheme is additionally offered.

References
  1. http://en. wikipedia. org/wiki/Smart_card.
  2. W. H. Yang, and S. P. Shieh, "Password authentication schemes with smart cards," Computers & Security 18 (8) (1999) 727-733.
  3. C. K. Chan, and L. M. Cheng, "Cryptanalysis of timestamp-based password authentication scheme," Computers & Security 21 (1) (2002) 74-76.
  4. M. S. Hwang, L. H. Li, A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 46 (1) (2000) 28-30.
  5. C. K. Chan, L. M. Cheng, Cryptanalysis of a remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 46 (4) (2000) 992-993.
  6. H. M. Sun, An efficient remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 46 (4) (2000) 958-961.
  7. C. L. Hsu, Security of two remote user authentication schemes using smart cards, IEEE Transactions on Consumer Electronics 49 (4) (2003) 1196-1198.
  8. H. Y. Chien, J. K. Jan, Y. M. Tseng, An efficient and practical solution to remote authentication: smart card, Computers & Security 21 (4) (2002) 372-375.
  9. M. S. Hwang, C. C. Lee, Y. L. Tang, A simple remote user authentication scheme, Mathematical and Computer Modelling 36 (1-2) (2002) 103-107.
  10. E. J. Yoon, E. K. Ryu, K. Y. Yoo, An improvement of Hwang-Lee-Tang's simple remote user authentication scheme, Computers & Security 24 (1) (2005) 50-56.
  11. W. C. Ku, S. M. Chen, Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 50 (1) (2004) 204-207.
  12. E. J. Yoon, E. K. Ryu, K. Y. Yoo, Further improvement of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 50 (2) (2004) 612-614.
  13. X. M. Wang, W. F. Zhang, J. S. Zhang, M. K. Khan, Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, Computer Standards and Interfaces 29 (5) (2007) 507-512.
  14. E. J. Yoon, E. J. Lee, K. Y. Yoo, Cryptanalysis of Wang et al. 's remote user authentication scheme using smart cards, 5th International Conference on Information Technology: New Generations (ITNG-2008) (2008) 575 - 580.
  15. M. L. Das, A. Saxena, V. P. Gulati, A Dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics 50 (2) (2004) 629-631.
  16. I. E. Liao, C. C. Lee, M. S. Hwang, Security enhancement for a dynamic ID-based remote user authentication scheme, International Conference on Next Generation Web Services Practices (2005).
  17. Y. Y. Wang, J. Y. Liu, F. X. Xiao, J. Dan, A more efficient and secure dynamic ID-based remote user authentication scheme, Computer Communications 32 (4) (2009) 583-585.
  18. Z. Hao, N. Yu, A security enhanced remote password authentication scheme using smart card, 2nd International Symposium on Data, Privacy, and E-Commerce (ISDPE-2010) (2010) 56-60.
  19. H. Zhang, M. Li, Security vulnerabilities of an remote password authentication scheme with smart card, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet-2011) (2011) 698-701.
  20. J. L. Tsai, T. C. Wu, K. Y. Tsai, New dynamic ID authentication scheme using smart cards, International Journal of Communication Systems 23 (12) (2010) 1449--1462.
  21. S. Wu, Y. Zhu, Q. Pu, Robust smart-cards-based user authentication scheme with user anonymity, Security and Communication Networks (2011). doi: 10. 1002/sec. 315
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Nonce Password Security Smart card