2013
DOI: 10.1002/dac.2534
|View full text |Cite
|
Sign up to set email alerts
|

Weakness of remote authentication scheme of Chen et al.

Abstract: SUMMARY The extensive application of mobile commerce has led researchers to design more secure protocols for mobile devices during the recent years. In 2011, Chen et al. proposed a three‐factor mobile device‐based remote authentication scheme, which tackled the security risk imposed by the loss of both password and mobile device. Scheme of Chen et al., however, is still vulnerable to the privileged insider attack, the replay attack, the impersonation attack, and the denial of service attack. It is not feasible… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 19 publications
(19 reference statements)
0
8
0
Order By: Relevance
“…According to the analysis in the documents , we show nine security characters of smart‐card‐based AKE schemes. And we will discuss the security of schemes mentioned in Sections 5 and 6 under these conditions.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the analysis in the documents , we show nine security characters of smart‐card‐based AKE schemes. And we will discuss the security of schemes mentioned in Sections 5 and 6 under these conditions.…”
Section: Preliminariesmentioning
confidence: 99%
“…Many attacks and security characters have been presented. Some experts made reviews to point out historical schemes' problems in particular . Recently, two aspects of security for smart‐card‐based schemes have been concentrated.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, many smart card-based password AKE [8][9][10][11][12][13][14][15][16][17][18] and biometric-based AKE with smart card [19][20][21][22][23], which are designed to realize stronger secure remote authentication than onefactor AKE, have been proposed. However, most of them lack the strict proof of security and do not really meet the security requirements of two-factor authentication.…”
Section: Previous Workmentioning
confidence: 99%
“…For remote user authentication systems [1], the concept of two-factor security came into existence after pioneered work by Hwang-Li [2]. Since then, an ample research [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] has been conducted in this field. In fact, two-factor security [21] is a step ahead of authentication systems based on singlefactor, which is generally a password.…”
Section: Introductionmentioning
confidence: 99%