Reference Hub2
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card

A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card

Ajay Kumar Sahu, Ashish Kumar
Copyright: © 2021 |Volume: 13 |Issue: 1 |Pages: 14
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799860341|DOI: 10.4018/IJDCF.2021010104
Cite Article Cite Article

MLA

Sahu, Ajay Kumar, and Ashish Kumar. "A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card." IJDCF vol.13, no.1 2021: pp.65-78. http://doi.org/10.4018/IJDCF.2021010104

APA

Sahu, A. K. & Kumar, A. (2021). A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card. International Journal of Digital Crime and Forensics (IJDCF), 13(1), 65-78. http://doi.org/10.4018/IJDCF.2021010104

Chicago

Sahu, Ajay Kumar, and Ashish Kumar. "A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card," International Journal of Digital Crime and Forensics (IJDCF) 13, no.1: 65-78. http://doi.org/10.4018/IJDCF.2021010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The two-factor-based password verification techniques are used between remote server and legitimate users for verification over insecure channel. Several protocols have been suggested previously claiming their simplicity, privacy, safety, and robustness. The authors proved that their enhanced protocols are vulnerable to different attacks on the network and permit only authenticated users to update their password preserving traceability and identity. Analysis shows that no scheme has fulfilled all the security requirements and achieved entire goals. Therefore, in this article, a scheme has been presented to overcome these issues in the previous schemes to resist illegal access leading to misuse and achieve all the security requirements and goals. The safety analysis of the presented scheme has confirmed its performance in terms of reliability and safety.