International Journal of Network Security
Whenever users want to access remote systems, they should be authenticated. Once authorized, they can then access the resources of the server. The scatter of remote systems in difference places allows more efficient and convenient access for geographically dispersed users. The researchers proposed an authentication method of a user from a remote autonomous object. Recently, they have pointed out that the Novikov-Kiselev scheme is insecure against the man-in-the-middle attack. In this paper, the authors propose an improved version of the Novikov-Kiselev scheme to overcome such vulnerability.