Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A secure one-time password authentication scheme with low-computation for mobile communications

Published: 01 April 2004 Publication History

Abstract

In recent years, m-commerce technology has been maturing. Various mobile devices are now designed to help users reach the servers of service providers and to process tasks such as stock trading, product purchasing, product information collecting, and so on. Once the services are only available to the members, authentication is applied to verify the identities of users. However, most current authentication methods used in m-commerce are designed for wired networks and require high computation costs, making them unsuitable for wireless environments.A one-time password authentication scheme that uses lighter computation and considers the limitations of mobile devices is proposed in this paper. Meanwhile, the proposed scheme is free from replay attacks, server spoofing attacks, off-line dictionary attacks, active attacks, and revelation of message contents.

References

[1]
C. J. Mitchell and L. Chen, "Comments on the S/KEY User Authentication Scheme, ACM Operating Systems Review," Vol. 30, No. 4, 1996, pp. 12--16.]]
[2]
N. M. Haller, "On Internet Authentication," RFC 1704, October 1994.]]
[3]
N. M. Haller, "The S/KEY One-Time Password System," RFC 1760, February 1995.]]
[4]
N. M. Haller, "A One-Time Password System," RFC 1938, May 1996.]]
[5]
P. Mackenzie and R. Swaminthan, "Secure Network Authentication with Password Identification," presented to the IEEE P1363 working group, 1999.]]
[6]
S. M. Yen and K. H. Liao, "Shared Authentication Token Secure against Replay and Weak Key Attacks," Information Processing Letters, Vol. 62, No. 2, April 1997, pp. 77--80.]]
[7]
Ronald L. Rivest and Adi Shamir, "PayWord and MicroMint: Two Simple Micropayment Schemes," CryptoBytes, Vol. 2, No. 1, Spring 1996, pp. 7--11.]]
[8]
T. Wu, "The Secure Remote Password Protocol," in Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, San Diego, CA, March 1998, pp. 97--111.]]
[9]
T. C. Yeh, H. Y. Shen, J. J. Hwang, "A Secure One-Time Password Authentication Scheme Using Smart Cards," IEICE Transactions on Communications, Vol. E85, No. 11, 2002, pp. 2515--2518.]]

Cited By

View all
  • (2024)Provably-Secure One-Message Unilateral Entity Authentication SchemesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.328847321:4(1665-1679)Online publication date: 1-Jul-2024
  • (2015)Biometric Authentication Technology Trends in Smart Device EnvironmentMobile and Wireless Technology 201510.1007/978-3-662-47669-7_23(199-206)Online publication date: 2015
  • (2014)An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and UpdateProceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications10.1109/AINA.2014.45(351-358)Online publication date: 13-May-2014
  • Show More Cited By
  1. A secure one-time password authentication scheme with low-computation for mobile communications

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM SIGOPS Operating Systems Review
        ACM SIGOPS Operating Systems Review  Volume 38, Issue 2
        April 2004
        92 pages
        ISSN:0163-5980
        DOI:10.1145/991130
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 April 2004
        Published in SIGOPS Volume 38, Issue 2

        Check for updates

        Author Tags

        1. authentication
        2. off-line dictionary attack
        3. one-time password
        4. replay attack
        5. server spoofing attack
        6. smart card

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 06 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Provably-Secure One-Message Unilateral Entity Authentication SchemesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.328847321:4(1665-1679)Online publication date: 1-Jul-2024
        • (2015)Biometric Authentication Technology Trends in Smart Device EnvironmentMobile and Wireless Technology 201510.1007/978-3-662-47669-7_23(199-206)Online publication date: 2015
        • (2014)An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and UpdateProceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications10.1109/AINA.2014.45(351-358)Online publication date: 13-May-2014
        • (2013)Insider Attack-Resistant OTP (One-Time Password) Based on Bilinear MapsInternational Journal of Computer and Communication Engineering10.7763/IJCCE.2013.V2.193(304-308)Online publication date: 2013
        • (2011)User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart PhoneAdvanced Communication and Networking10.1007/978-3-642-23312-8_7(49-58)Online publication date: 2011
        • (2011)User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart PhoneInformation Security and Assurance10.1007/978-3-642-23141-4_42(395-404)Online publication date: 2011
        • (2010)Vulnerability analysis and the practical implications of a server‐challenge‐based one‐time password systemInformation Management & Computer Security10.1108/0968522101104833718:2(86-100)Online publication date: 8-Jun-2010
        • (2010)A Lightweight Authentication Protocol for Web Applications in Mobile EnvironmentsEmergent Web Intelligence: Advanced Information Retrieval10.1007/978-1-84996-074-8_14(371-391)Online publication date: 17-Feb-2010
        • (2009)An efficient One-Time Password authentication scheme using a smart cardInternational Journal of Security and Networks10.1504/IJSN.2009.0273404:3(145-152)Online publication date: 1-Jul-2009
        • (2008)Symmetric identity federation for fixed-mobile convergenceProceedings of the 4th ACM workshop on Digital identity management10.1145/1456424.1456431(33-40)Online publication date: 31-Oct-2008
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media