Attacks to Li et al.’s Billing Service User Authentication Scheme

Article Preview

Abstract:

This paper is intended to explore the weakness of Li et al.’s billing service user authentication scheme. The users of this authentication scheme are required to compute a series of session keys and use different session key in different session to strengthen the robustness of this scheme. They are not only difficult to remember but also can be figured out by attacks, making authentication function useless. In addition, the system may cause denial of service because synchronization could not always be guaranteed. We illustrate all possible attacks against this system that may be realized, and give an analysis of its weakness.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1762-1767

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consumer Electroncs, vol. 46, no.1, 2000, pp.28-30.

DOI: 10.1109/30.826377

Google Scholar

[2] H. M. Sun, "An efficient remote user attention scheme using smart cards," IEEE Trans. Consumer Electroncs," vol. 46, no.4, 2000, pp.958-961.

DOI: 10.1109/30.920446

Google Scholar

[3] C.K. Chan, and L. M. Cheng, "Cryptanalysis of a remote user attention scheme using smart cards," IEEE Trans. Consumer Electroncs," vol. 46, no.4, 2000, pp.992-993.

DOI: 10.1109/30.920451

Google Scholar

[4] H. Y. Chien, J. K. Jan and Y. M. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers and Security, vol.21, no. 4, 2002, pp.372-375.

DOI: 10.1016/s0167-4048(02)00415-7

Google Scholar

[5] C. L. Hsu, "Security of Chien et al.'s remote user authentication scheme using smart cards," Computer Standards and Interfaces, vol. 26, no. 3, 2004, pp.167-169.

DOI: 10.1016/s0920-5489(03)00094-1

Google Scholar

[6] S.-W. Lee, H.-S. Kim and K.-Y. Yoo, "Efficient nonce-based remote user authentication scheme using smart cards," Applied Mathematics and Computation, vol.167, 2005, pp.335-361.

DOI: 10.1016/j.amc.2004.06.111

Google Scholar

[7] C.-T. Li, C.-C. Lee, L.-J. Wang and C.-J. Liu, "A secure billing service with two-factor user authentication in wireless sensor networks, "International Journal of Innovative Computing, Information and Control, vol.7, no. 8, 2011, pp.4821-4831.

Google Scholar

[8] M. L. Das, "Two–factor user authentication in wireless sensor networks," IEEE Trans. Wireless Communications, vol. 8, no. 3, 2009, pp.1086-1090.

DOI: 10.1109/twc.2008.080128

Google Scholar