A secure three factor-based fully anonymous user authentication protocol for multi-server environment

被引:1
|
作者
Mahor, Vinod Kumar [1 ]
Padmavathi, R. [2 ]
Chatterjee, Santanu [1 ]
Dewangan, Sanshray Kumar [2 ]
Kumar, Manish [2 ]
机构
[1] Def Res & Dev Org, Res Ctr Imarat, Hyderabad 500069, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Warangal 506004, Andhra Pradesh, India
关键词
authentication; multi-server authentication; security; smart card; Lagrange interpolation; single sign-on; AVISPA; BAN logic; PASSWORD AUTHENTICATION; PROVABLY SECURE; SCHEME; IMPROVEMENT; BIOMETRICS;
D O I
10.1504/IJAHUC.2020.107506
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A single sign-on authentication scheme is required protocol in multi-server environment. Recently, an authentication protocol based on Lagrange interpolation polynomial to satisfy multi-server environment with low computational and communication cost is proposed. In this paper, we have analysed the above scheme and show that their scheme is vulnerable to various attacks like insider attack, server impersonation attack, user impersonation attack and stolen smart card attack. We also show that their scheme fails to provide server anonymity, user revocation in case smart card is lost/stolen or users authentication parameters are revealed. We have also proposed enhanced multi-server authentication protocol using biometric-based smart card and Lagrange interpolation which is more secure. The proposed protocol is analysed using BAN logic to show that the proposed protocol provides secure authentication. In addition, we have simulated our scheme using widely accepted and used AVISPA tool to prove that our scheme is secure against passive and active attacks. The proposed protocol provides high security and anonymity along with low communication and computational cost and various security functions.
引用
收藏
页码:45 / 60
页数:16
相关论文
共 50 条
  • [21] An Improved Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment
    Lee, Cheng-Chi
    Lai, Yan-Ming
    Li, Chun-Ta
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 203 - 210
  • [22] Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    Hsiang, Han-Cheng
    Shih, Wei-Kuan
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1118 - 1123
  • [23] Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
    Chandrakar, Preeti
    Om, Hari
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 765 - 786
  • [24] Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
    Preeti Chandrakar
    Hari Om
    Arabian Journal for Science and Engineering, 2017, 42 : 765 - 786
  • [25] A secure dynamic identity based authentication protocol for multi-server architecture
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (02) : 609 - 618
  • [26] Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment
    Ali, Rifaqat
    Pal, Arup Kumar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (08) : 3655 - 3672
  • [27] Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment
    Rifaqat Ali
    Arup Kumar Pal
    Arabian Journal for Science and Engineering, 2017, 42 : 3655 - 3672
  • [28] Distributed utility based User Authentication protocol for multi-server environment with key agreement utility
    Anand, Darpan
    Khemchandani, Vineeta
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 415 - 420
  • [29] Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol
    Georgescu, Adela
    INTERNATIONAL JOINT CONFERENCE SOCO'14-CISIS'14-ICEUTE'14, 2014, 299 : 495 - 504
  • [30] A Three-Factor Remote Authentication Scheme for Multi-server Environment
    Cui, Jianming
    Chen, Chen
    Zhang, Xiaojun
    Liu, Yihui
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 694 - 705