作者: Mrudula Sarvabhatla , M. Chandra Mouli Reddy , Chandra Sekhar Vorugunti
DOI: 10.1109/AIMOC.2015.7083847
关键词: Data Authentication Algorithm 、 Authentication 、 Challenge-Handshake Authentication Protocol 、 Computer science 、 Multi-factor authentication 、 Computer security 、 Reflection attack 、 Computer network 、 Authentication protocol 、 Internet Authentication Service 、 Challenge–response authentication
摘要: Rapid growth of mobile and networking technologies, resulted in new paradigms like Internet Things (IoT) etc, which allows user to connect insecure public communication channel through various devices can access the services data provided by remote server. Thus, authentication key agreement for wireless, wired, IoT communications becoming more challenging task. In this context many researchers have proposed schemes. 2013, An et al. a dynamic ID-based scheme is secure, even if secret values stored smart card revealed. 2014, Troung al claimed that vulnerable server forgery attack an improved scheme. manuscript, we validate al's known session specific temporary information attack, replay impersonation attack. Furthermore, also propose overcome these limitations without increase cost front.