Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme
NWESP '05 Proceedings of the International Conference on Next Generation Web Services Practices
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
An efficient anonymous authentication mechanism for delay tolerant networks
Computers and Electrical Engineering
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
International Journal of Communication Systems - Part 2: Next Generation Networks (NGNs)
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
New dynamic ID authentication scheme using smart cards
International Journal of Communication Systems
Lightweight and provably secure user authentication with anonymity for the global mobility network
International Journal of Communication Systems
Cryptanalysis of a simple three-party password-based key exchange protocol
International Journal of Communication Systems
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
A practical authentication protocol with anonymity for wireless access networks
Wireless Communications & Mobile Computing
An improved dynamic ID-based remote user authentication with key agreement scheme
Computers and Electrical Engineering
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Hi-index | 0.00 |
A dynamic user authentication scheme allows a user and a remote server to authenticate each other without leaking the user's identity. In 2011, Wen and Li proposed an improved dynamic ID-based remote user authentication with key agreement scheme for mobile and home networks. They claimed that their scheme was more secure than the scheme of Wang et al. However, we demonstrate that their scheme is vulnerable to the privileged insider, off-line password guessing, impersonation, and server spoofing attacks. At the same time, it does not provide any user anonymity and forward secrecy property. Thus, it is not feasible for real-life implementation.Copyright © 2012 John Wiley & Sons, Ltd.