Remote User Authentication Schemes: A Review
Journal Title: International Journal of Engineering and Science Invention - Year 2017, Vol 6, Issue 12
Abstract
To secure the resources or information from illegitimate users various kinds of authentication schemes have been designed and developed. Some of these schemes are vulnerable to a variety of attacks. In last decade authentication schemes based on smart card has been proposed to withstand the possible attacks on verification table. Smart card provides a convenient storage and processing capability to the users. It is widely used for a range of applications such as remote user authentication, ID verification and access control.The present study gives recent developments in the area of smart card based authentication schemes and their comparative analysis. It also presents security requirements to the design and development of best authentication scheme. We have taken various authentication schemes as sample for efficiency comparisons and provide comparison results based on various operation used in respective schemes. This paper identified various security requirements which are must require in strong and efficient authentication schemes: Authentication schemes built on presented security requirements can be applied for online health care system, telecare system, Medicare system etc. for patient health care data privacy.
Authors and Affiliations
Narendra Singh Panwar, Dr. Manmohan Singh Rauthan, Dr. Amit Agarwal Agarwal
Population Dynamics Of Yellow Stem Borer Scirphophaga Incertulas (Walker) On Rice (Oryza Sativa): Using Sex Pheromone Trap At Shivamogga District, Karnataka.
The insect Scirpophga incertulas commonly known as yellow stem borer (YSB) of rice is distributed widely, covering almost all Asian countries, YSB usually occupied more than 90% of the borer population in the rice crop f...
Finite Element Analysis of Optimization for Turning Parameters of Super Alloy Inconel 718
Alloy Inconel 718, a nickel based super alloy, developed initially for use in rotating parts in aerospace and gas turbine applications, has become the preferred material for the manufacture of important Components and Au...
An Approach using Local Information to Build QoS Routing Algorithm
The requirement for quality of service (QoS) is more and more sophisticated, such as the required bandwidth, the value of delay time or packet loss. To assure the network performance, localized QoS routing algorithms hav...
Pathology Voice Detection and Classification Using Ensemble Learning
Voice disorder is a large phenomenon which is dramatically affecting a large number of people. These pathological conditions are caused due to various reasons and some of the reasons might be talking too much, screaming...
An Overview of Fuzzy Logic Applications
Fuzzy logic has become a very promising mathematical approach that is based near the human thinking and natural activities. In a classical logic system an object either is or is not a member of a set but a member in a fu...