2012
DOI: 10.7763/ijcte.2012.v4.452
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues in Smart Card Authentication Scheme

Abstract: To secure information from unauthorized access, various authentication schemes have been deployed. Among these, password based authentication schemes using smart card are widely used for various applications such as remote user login, online banking, ID verification, access control and e-commerce. It provides mutual authentication between user and server. This article portrays security requirements and possible attacks for smart card based password authentication scheme. In addition, various solutions for diff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Authentication, non-repudiation, confidentiality, and integrity are the fundamental security properties that must be satisfied by any system. However, by studying Ko and Caytiles [3] and Pippal et al [4], it can be figured out that in addition to these four fundamental security properties, forward security, along with availability, must also be included in the implementation in order to secure the smart cards. The security attributes satisfied by smart card-based systems are briefly described below:…”
Section: Security Requirements For Smart Cardsmentioning
confidence: 99%
See 1 more Smart Citation
“…Authentication, non-repudiation, confidentiality, and integrity are the fundamental security properties that must be satisfied by any system. However, by studying Ko and Caytiles [3] and Pippal et al [4], it can be figured out that in addition to these four fundamental security properties, forward security, along with availability, must also be included in the implementation in order to secure the smart cards. The security attributes satisfied by smart card-based systems are briefly described below:…”
Section: Security Requirements For Smart Cardsmentioning
confidence: 99%
“…Ko and Caytiles wrote a review of the security of smart card-based systems and categorized the attacks on smart cards as side-channel attacks, logical attacks, physical attacks, and other attacks. Pippal et al [4] pointed out that impersonation attacks, session attacks, password-guessing attacks, and replay attacks can be launched on smart cards. Mahanta et al [6] have explored that besides other attacks, power analysis attacks are also a threat to smart cards.…”
mentioning
confidence: 99%
“…H o o n K o and C a y t i l e s [19] have given a review on smart card security in which they have divided the attacks on smart cards into four categorieslogical attacks, physical attacks, side channel attacks, and other attacks. P i p p a l, J a i d h a r and T a p a s w i [34] have mentioned that the password guessing attack, impersonation attack, session attack, replay attack, DoS attack, and attack on forward secrecy can be attempted on the authentication schemes of smart cards. M a h a n t a, A z a d and K h a n [35] have mentioned that power analysis attacks are also a threat for smart cards.…”
Section: Threats and Attacksmentioning
confidence: 99%
“…Today, authentication based on smart card has been employed continuously in several applications like cloud computing [12], healthcare [13], key exchange in IPTV broadcasting [14], wireless networks [15], authentication in multi-server environment [16], wireless sensor networks [17] and many more. The security requirements and possible attacks related to password based smart card authentication scheme have been sorted out [18].…”
Section: Introductionmentioning
confidence: 99%