Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A secure one-time password authentication scheme with low-computation for mobile communications

Published: 01 April 2004 Publication History

Abstract

In recent years, m-commerce technology has been maturing. Various mobile devices are now designed to help users reach the servers of service providers and to process tasks such as stock trading, product purchasing, product information collecting, and so on. Once the services are only available to the members, authentication is applied to verify the identities of users. However, most current authentication methods used in m-commerce are designed for wired networks and require high computation costs, making them unsuitable for wireless environments.A one-time password authentication scheme that uses lighter computation and considers the limitations of mobile devices is proposed in this paper. Meanwhile, the proposed scheme is free from replay attacks, server spoofing attacks, off-line dictionary attacks, active attacks, and revelation of message contents.

References

[1]
C. J. Mitchell and L. Chen, "Comments on the S/KEY User Authentication Scheme, ACM Operating Systems Review," Vol. 30, No. 4, 1996, pp. 12--16.]]
[2]
N. M. Haller, "On Internet Authentication," RFC 1704, October 1994.]]
[3]
N. M. Haller, "The S/KEY One-Time Password System," RFC 1760, February 1995.]]
[4]
N. M. Haller, "A One-Time Password System," RFC 1938, May 1996.]]
[5]
P. Mackenzie and R. Swaminthan, "Secure Network Authentication with Password Identification," presented to the IEEE P1363 working group, 1999.]]
[6]
S. M. Yen and K. H. Liao, "Shared Authentication Token Secure against Replay and Weak Key Attacks," Information Processing Letters, Vol. 62, No. 2, April 1997, pp. 77--80.]]
[7]
Ronald L. Rivest and Adi Shamir, "PayWord and MicroMint: Two Simple Micropayment Schemes," CryptoBytes, Vol. 2, No. 1, Spring 1996, pp. 7--11.]]
[8]
T. Wu, "The Secure Remote Password Protocol," in Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, San Diego, CA, March 1998, pp. 97--111.]]
[9]
T. C. Yeh, H. Y. Shen, J. J. Hwang, "A Secure One-Time Password Authentication Scheme Using Smart Cards," IEICE Transactions on Communications, Vol. E85, No. 11, 2002, pp. 2515--2518.]]

Cited By

View all
  • (2024)Provably-Secure One-Message Unilateral Entity Authentication SchemesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.328847321:4(1665-1679)Online publication date: 1-Jul-2024
  • (2015)Biometric Authentication Technology Trends in Smart Device EnvironmentMobile and Wireless Technology 201510.1007/978-3-662-47669-7_23(199-206)Online publication date: 2015
  • (2014)An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and UpdateProceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications10.1109/AINA.2014.45(351-358)Online publication date: 13-May-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 38, Issue 2
April 2004
92 pages
ISSN:0163-5980
DOI:10.1145/991130
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2004
Published in SIGOPS Volume 38, Issue 2

Check for updates

Author Tags

  1. authentication
  2. off-line dictionary attack
  3. one-time password
  4. replay attack
  5. server spoofing attack
  6. smart card

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Provably-Secure One-Message Unilateral Entity Authentication SchemesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.328847321:4(1665-1679)Online publication date: 1-Jul-2024
  • (2015)Biometric Authentication Technology Trends in Smart Device EnvironmentMobile and Wireless Technology 201510.1007/978-3-662-47669-7_23(199-206)Online publication date: 2015
  • (2014)An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and UpdateProceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications10.1109/AINA.2014.45(351-358)Online publication date: 13-May-2014
  • (2013)Insider Attack-Resistant OTP (One-Time Password) Based on Bilinear MapsInternational Journal of Computer and Communication Engineering10.7763/IJCCE.2013.V2.193(304-308)Online publication date: 2013
  • (2011)User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart PhoneAdvanced Communication and Networking10.1007/978-3-642-23312-8_7(49-58)Online publication date: 2011
  • (2011)User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart PhoneInformation Security and Assurance10.1007/978-3-642-23141-4_42(395-404)Online publication date: 2011
  • (2010)Vulnerability analysis and the practical implications of a server‐challenge‐based one‐time password systemInformation Management & Computer Security10.1108/0968522101104833718:2(86-100)Online publication date: 8-Jun-2010
  • (2010)A Lightweight Authentication Protocol for Web Applications in Mobile EnvironmentsEmergent Web Intelligence: Advanced Information Retrieval10.1007/978-1-84996-074-8_14(371-391)Online publication date: 17-Feb-2010
  • (2009)An efficient One-Time Password authentication scheme using a smart cardInternational Journal of Security and Networks10.1504/IJSN.2009.0273404:3(145-152)Online publication date: 1-Jul-2009
  • (2008)Symmetric identity federation for fixed-mobile convergenceProceedings of the 4th ACM workshop on Digital identity management10.1145/1456424.1456431(33-40)Online publication date: 31-Oct-2008
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media