Title :
Further Analysis and Improvement of Yoon et al.´s Hash-Based User Authentication Scheme
Author :
Wang Bang-Ju ; Shu-Hua, Li ; Zhang Huan-Guo
Author_Institution :
Sch. of Sci., Huazhong Agric. Univ., Wuhan
Abstract :
In 2002, Lee et al. proposed a scheme improving on Peyravian and Zunic scheme. However, Yoon et al. found that the scheme is vulnerable to a denial of service (DoS) attack and proposed a enhanced scheme on Lee et al.´s scheme. Unfortunately, Ku et al. pointed out that Yoon et al.´s scheme can not achieve backward secrecy and is vulnerable to off-line password guessing and stolen-verifier attacks. In this paper, the other security flaws of the scheme that new insider attack and replay attack are stated, and an improved hash based scheme on Yoon et al.´s scheme is proposed. The improved scheme in this paper can fix all the known security flaws of Yoon et al.´s scheme except for backward secrecy and is more secure and efficient for practical application in source constraint wireless networks.
Keywords :
authorisation; cryptography; wireless channels; Peyravian scheme; Zunic scheme; denial of service attack; hash-based user authentication; off-line password guessing; security flaws; source constraint wireless networks; stolen-verifier attacks; Authentication; Computational efficiency; Computer crime; Mobile communication; Mobile computing; Public key; Public key cryptography; Resists; Security; Wireless networks; attack; hash function; password; password authentication;
Conference_Titel :
Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on
Conference_Location :
Yunnan
Print_ISBN :
978-0-7695-3501-2
DOI :
10.1109/CMC.2009.271