Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) 2008
DOI: 10.1109/hicss.2008.208
|View full text |Cite
|
Sign up to set email alerts
|

Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks

Abstract: In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenticate home users who uses home devices. Several techniques using technology based on biometrics, passwords, certificates, and smart cards can be used for user authentication in the similar environments. However, such user authentication techniques must be examined before being employed in an environment where home devices have low effici… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(46 citation statements)
references
References 14 publications
0
44
0
Order By: Relevance
“…Usage of mobile device was seen in the work of Hallsteinsen and Jorstad [5] for performing authentication. Certain studies [6] have also introduced Smart cards for security checks for user. The work was mainly focused on mitigating replay attack and uses the one-time password technique and one-way hash functions to reduce the processing overhead.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Usage of mobile device was seen in the work of Hallsteinsen and Jorstad [5] for performing authentication. Certain studies [6] have also introduced Smart cards for security checks for user. The work was mainly focused on mitigating replay attack and uses the one-time password technique and one-way hash functions to reduce the processing overhead.…”
Section: Related Workmentioning
confidence: 99%
“…The work was mainly focused on mitigating replay attack and uses the one-time password technique and one-way hash functions to reduce the processing overhead. Unlike the weak-password approach, strong password authentication is mostly based on the one-way hash function [6] and exclusive-OR operations (XOR). Enhancement on the one-time password scheme using chaos theory was also seen in literature [7].…”
Section: Related Workmentioning
confidence: 99%
“…Our protocol provides secure communications between heterogeneous network devices. We determine the security requirements by analyzing existing symmetric key and public key systems in order to develop a secure and more efficient heterogeneous key management system [3,4]. The remainder of the paper is structured as follows.…”
Section: Introductionmentioning
confidence: 99%
“…The user authentication scheme based the OTP proposed in [3] offer more secure communication service by using the OTP based on hash function than scheme using the general password. However, this scheme also is only available to connect the home network with client device registered on home server in advance.…”
Section: Related Workmentioning
confidence: 99%
“…The user and client are authenticated if the values in message (3) and them in table is same. Then, HNAS generate the ticket that a client can use to access to HS.…”
Section: Figure 2 Authentication Protocol Of Registered Clientmentioning
confidence: 99%