JOURNAL BROWSE
Search
Advanced SearchSearch Tips
An ID-Based Remote User Authentication Scheme in IoT
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
An ID-Based Remote User Authentication Scheme in IoT
Park, KiSung; Lee, SungYup; Park, YoHan; Park, YoungHo;
  PDF(new window)
 Abstract
Applications of Internet of Things (IoT) supply various conveniences, however unsolved security problems such as personal privacy, data manipulation cause harm to persons, even nations and an limit the applicable areas of Internet of IoT technology. Therefore, study about secure and efficient security system on IoT are required. This paper proposes ID-based remote user authentication scheme in IoT environments. Proposed scheme provides untraceability of users by using different pseudonym identities in every session and reduces the number of variables. Our proposal is secure against inside attack, smart card loss attack, user impersonation attack, server masquerading attack, online/offline password guessing attack, and so on. Therefore, this can be applied to the lightweight IoT environments.
 Keywords
Internet of Things;Authentication;ID-based;Untraceability;
 Language
Korean
 Cited by
1.
순방향 안전성을 제공하는 대칭키 기반의 원격 사용자 인증 방식,이성엽;박기성;박요한;박영호;

한국멀티미디어학회논문지, 2016. vol.19. 3, pp.585-594 crossref(new window)
1.
Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy, Journal of Korea Multimedia Society, 2016, 19, 3, 585  crossref(new windwow)
 References
1.
Q. Jing, A.V. Vasilakos, J. Wan, J. Lu, and D. Qui, “Security of the Internet of Things:Perspectives and Challenges," Wireless Networks, Vol. 20, No. 8, pp. 2481-2501, 2014. crossref(new window)

2.
S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, “Security, Privacy and Trust in Internet of Things: The Road Ahead,” Computer Networks, Vol. 76, No. 15, pp. 146-164, 2015. crossref(new window)

3.
YoHan Park, and YoungHo Park, “Secure Private Key Revocation Scheme in Anonymous Cluster-Based MANETs ,” Journal of Korea Multimedia Society, Vol. 18, No. 4, pp. 499-505, 2015. crossref(new window)

4.
Y. Wang, J. Liu, F. Xiao, and J. Dan, “A more Efficient and Secure Dynamic ID-based Remote User Authentication Scheme," Computer Communications, Vol. 32, No. 4, pp. 583-585, 2009. crossref(new window)

5.
M.L. Das, A. Saxena, and V.P. Gulati, “A Dynamic ID-based Remote User Authentication Scheme,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 629-631, 2004. crossref(new window)

6.
Y. Chang, W. Tai, and H. Chang, “Untraceable Dynamic-identity-based Remote User Authentication Scheme with Verifiable Password Update,” International Journal of Communication Systems, Vol. 27, No. 11, pp. 3430-3440, 2014.

7.
X. Li, J. Niu, J. Liao, and W. Liang, “Cryptanalysis of a Dynamic Identity-based Remote User Authentication Scheme with Verifiable Password Update,” International Journal of Communication Systems, Vol. 28, No. 2, pp. 374-382, 2015. crossref(new window)

8.
S. Kumari, M.K. Khan, and X. Li, “An Improved Remote User Authentication Scheme with Key Agreement,” Computers & Electrical Engineering, Vol. 40, No. 6, pp. 1997-2012, 2014. crossref(new window)

9.
L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1987. crossref(new window)

10.
M.S. Hwang and L.H. Li, “A New Remote User Authentication Scheme using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2002. crossref(new window)

11.
B.L. Chen, W.C. Kuo, and L.C. Wuu, “Robust Smart-card-based Remote User Password Authentication Scheme,” International Journal of Communications, Vol. 27, No. 2, pp. 377-389, 2014.