Weakness of Remote Authentication Scheme of Chen Et Al.

Hong-bin Tang,Xin-song Liu,Jian-ying Chen
DOI: https://doi.org/10.1002/dac.2534
2013-01-01
International Journal of Communication Systems
Abstract:SUMMARYThe extensive application of mobile commerce has led researchers to design more secure protocols for mobile devices during the recent years. In 2011, Chen et al. proposed a three‐factor mobile device‐based remote authentication scheme, which tackled the security risk imposed by the loss of both password and mobile device. Scheme of Chen et al., however, is still vulnerable to the privileged insider attack, the replay attack, the impersonation attack, and the denial of service attack. It is not feasible for real‐life implementation. Copyright © 2013 John Wiley & Sons, Ltd.
What problem does this paper attempt to address?