Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices

被引:0
作者
Karati, Arijit [1 ]
Chang, Yu-Sheng [1 ]
Chen, Ting-Yu [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung, Taiwan
来源
PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023 | 2023年
关键词
Authentication; Key Agreement; Extended Chaotic Maps (ECM); Physically Unclonable Function (PUF); Security and Privacy; Lightweight Cryptography; SCHEME;
D O I
10.5220/0012077600003555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key based authentication and key agreement (AKA) protocols have attracted considerable interest in providing secure access for various application scenarios. Although three-factor AKA (3FAKA) offers higher security than one- or two-factor ones, most existing 3FAKA are vulnerable, or their safety is reduced to the security of one- or two-factor authentication. Thus, finding a balance between security and usability and countering cloning risks with robust three-factor authentication is an ongoing problem. To mitigates such issues, we propose a lightweight 3FAKA for mobile devices. The suggested 3FAKA employs the physical unclonable function to withstand device cloning attacks and extended chaotic maps to preserve lightweight processes while ensuring essential cryptographic traits, such as unpredictability, unrepeatability, and uncertainty. It is secure under the intractability of extended chaotic maps computational Diffie-Hellman problem. Performance analysis exhibits that our protocol provides a comprehensive set of security and functional aspects accounting for adequate computation, storage, and communication costs compared to state-of-the-art alternatives.
引用
收藏
页码:673 / 682
页数:10
相关论文
共 29 条
[1]   Low Power Data Integrity in IoT Systems [J].
Aman, Muhammad Naveed ;
Sikdar, Biplab ;
Chua, Kee Chaing ;
Ali, Anwar .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :3102-3113
[2]   An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Park, Youngho .
SENSORS, 2020, 20 (04)
[3]   Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment [J].
Chatterjee, Santanu ;
Roy, Sandip ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :824-839
[4]   Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Khan, Muhammad Khurram ;
Choo, Kim-Kwang Raymond ;
Park, YoungHo .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) :1310-1322
[5]   Multifactor authentication scheme using physically unclonable functions [J].
Fakroon, Moneer ;
Gebali, Fayez ;
Mamun, Mohammad .
INTERNET OF THINGS, 2021, 13
[6]  
Hu V. C., 2013, NIST Special Publication, V800, DOI DOI 10.6028/NIST.SP.800-162
[7]   Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps [J].
Islam, S. K. Hafizul .
NONLINEAR DYNAMICS, 2014, 78 (03) :2261-2276
[8]   Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles [J].
Jiang, Qi ;
Zhang, Ning ;
Ni, Jianbing ;
Ma, Jianfeng ;
Ma, Xindi ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) :9390-9401
[9]   User centric three-factor authentication protocol for cloud-assisted wearable devices [J].
Jiang, Qi ;
Qian, Yuanyuan ;
Ma, Jianfeng ;
Ma, Xindi ;
Cheng, Qingfeng ;
Wei, Fushan .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (06)
[10]   Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy [J].
Jiang, Qi ;
Wei, Fushan ;
Fu, Shuai ;
Ma, Jianfeng ;
Li, Guangsong ;
Alelaiwi, Abdulhameed .
NONLINEAR DYNAMICS, 2016, 83 (04) :2085-2101