Title: An Efficient 3-Factor Authentication for Secure Communication using Improved Smart Cards Authentication
Year of Publication: 2017
Publisher: International Journal of Computer Systems (IJCS)
ISSN: 2394-1065
Series: Volume 04, Number 7, July 2017
Authors: Salil Jain, Deepak Sain


Salil Jain, Deepak Sain, "An Efficient 3-Factor Authentication for Secure Communication using Improved Smart Cards Authentication", In International Journal of Computer Systems (IJCS), pp: 160-164, Volume 4, Issue 7, July 2017. BibTeX

	author = {Salil Jain, Deepak Sain},
	title = {An Efficient 3-Factor Authentication for Secure Communication using Improved Smart Cards Authentication},
	journal = {International Journal of Computer Systems (IJCS)},
	year = {2017},
	volume = {4},
	number = {7},
	pages = {160-164},
	month = {July}


Security in computers is information protection from unauthorized or accidental disclosure while the information is in transmission and while information is in storage. Authentication protocols provide two entities to ensure that the counterparty is the intended one whom he attempts to communicate with over an insecure network. These protocols can be considered from three dimensions: type, efficiency and security. The Existing methodology implemented for Secure Communication using Smart Cards provides efficient Security from various attacks, but provides high Computation and Communication Cost, hence a new and efficient technique is implemented which is based on Concept of 3-Factor Authentication. In the First Factor Authentication secure password is generated for valid User and then Image based Authentication is generated and finally smart card based authentication is provided. The Proposed methodology implemented provides Secure Communication from various attacks and low Communication and Computation Cost.


[1] GWang, Y. and kobsa A. (2009). Privacy-enhancing technologies. In Gupta , M. and Sharman, R., editors, Social and Organizational Liabilities in Information Security, pages 203–227.
[2] A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: a tool for information security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125–143, 2006.
[3] J. Yu, G. Wang, and Y. Mu, “Provably secure single sign-on scheme in distributed systems and networks,” in TrustCom, 2012, pp. 271–278.
[4] G. Wang, J. Yu, and Q. Xie, “Security analysis of a single sign-on mechanism for distributed computer networks, ”IEEE Trans. Industrial Informatics, vol. 9, no. 1, pp. 294–302, 2013.
[5] J. K. Lee, S.R. Ryu, and K.Y. Yoo, “Fingerprint-Based Remote User Authentication Scheme Using Smart Cards,” Electronics Letters, vol. 38, no. 12, pp. 554-555, June 2002.
[6] C.C. Chang and I.C. Lin, “Remarks on Fingerprint-Based Remote User Authentication Scheme Using Smart Cards,” ACM SIGOPS Operating Systems Rev., vol. 38, no. 4, pp. 91-96, Oct. 2004.
[7] Khan, M., Kim, S., Alghathbar, K.: Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme’. Computer Communications 34(3), 305–309, 2011.
[8] Li, C.T., Lee, C.C.: “A robust remote user authentication scheme using smart card” Information Technology And Control 40(3), 236–245, 2011.
[9] Ma, C.G., Wang, D., Zhang, Q.M.: “Cryptanalysis and improvement of sood et al.s dynamic id-based authentication scheme”,In: Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT’12, LNCS, vol. 7154, pp. 141–152. Springer-Verlag, 2012.
[10] Kasper, T., Oswald, D., Paar, C.”Side-channel analysis of cryptographic rfids with analog demodulation”. In: Juels, A., Paar, C. (eds.) RFIDSec’12, LNCS, vol. 7055, pp. 61–77. Springer Berlin / Heidelberg, 2012.
[11] Pu, Q.,”An improved two-factor authentication protocol”. In: 2010 International Conference on Multimedia and Information Technology (MMIT). vol. 2, pp. 223– 226. Ieee, 2010.
[12] Shim, K.:” Security flaws in three password-based remote user authentication schemes with smart cards”. Cryptologia 36(1), 62–69, 2012.
[13] Wang, Y.G.: “Password protected smart card and memory stick authentication against off-line dictionary attacks”. In: Gritzalis, D., Furnell, S., M., T. (eds.) SEC 2012, IFIP AICT, vol. 376, pp. 489–500. Springer Boston availe at yonwang/papers/smartcard.pdf, 2012.
[14] Xie, Q.: Dynamic id-based password authentication protocol with strong security against smart card lost attacks. In: Snac, P., Ott, M., Seneviratne, A., Akan, O. (eds.) Wireless Communications and Applications, LNICST, vol. 72, pp. 412–418. Springer Berlin / Heidelberg, 2012.


Authentication, Group Key Transfer, OTPK, Image Authentication, Smart Cards, Attacks.