Weaknesses of a Dynamic ID Based Remote User Authentication Protocol for Multi-Server Environment

  • Madhusudhan R
  • Praveen A
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Currently, smart card based remote user authentication schemes have been widely adopted due to their low cost and convenient portability. With the purpose of using various different internet services with single registration and to protect the users from being tracked, various dynamic ID based multi-server authentication protocols have been proposed. Recently, Li et al. proposed an efficient and secure dynamic ID based authentication protocol using smart cards. They claimed that their protocol provides strong security. In this paper, we have demonstrated that Li et al.’s protocol is vulnerable to replay attack, denial of service attack, smart card lost attack, eavesdropping attack and server spoofing attacks.

Cite

CITATION STYLE

APA

Madhusudhan, R., & Praveen, A. (2014). Weaknesses of a Dynamic ID Based Remote User Authentication Protocol for Multi-Server Environment. Journal of Computer and Communications, 02(04), 196–200. https://doi.org/10.4236/jcc.2014.24026

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free