Comments on the S/KEY user authentication scheme
ACM SIGOPS Operating Systems Review
Shared authentication token secure against replay and weak key attacks
Information Processing Letters
Timestamps in key distribution protocols
Communications of the ACM
Robust one-time password authentication scheme using smart card for home network environment
Computer Communications
Hi-index | 0.00 |
We study user authentication protocols that allow user to remotely access and control home appliances through home gateway. In particular, we explore the S/Key user authentication scheme, a widely known one-time password system. Earlier studies show that S/Key is vulnerable to server spoofing, replay, and off-line dictionary attacks. Several researchers have proposed various solutions to prevent such attacks. However, we show that these enhancements are still vulnerable to another security attacks and propose a scheme that defends such attacks.