A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card

被引:11
作者
Srinivas, Jangirala y [1 ]
Mukhopadhyay, Sourav [1 ]
Mishra, Dheerendra [2 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Math, Kharagpur 721302, W Bengal, India
[2] LNMIIT, Dept Math, Jaipur 302031, Rajasthan, India
关键词
Authentication; Smart card; Key agreement; Multi-server architecture; KEY EXCHANGE PROTOCOL; USER AUTHENTICATION; AGREEMENT SCHEME; POWER ANALYSIS; EFFICIENT; SECURITY; INTERNET; ROBUST;
D O I
10.1007/s11277-017-4476-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In network based services, remote user authentication has become an important and challenging part to ensure authorized access of resource. The traditional two party architectures are not enough to present scalable solution to multi-server environment as user need to follow multiple registrations. On the other hands, multi-server authentication scheme resolves the repeated registration issue, where one time registration is enough to access the multiple servers of an architecture. To achieve efficient solution, Pippel et al. (Wirel Pers Commun 72(1):729-745, 2013) proposed a smart card based authentication scheme for multi-server environment. However, Li et al. (Int J Commun Syst 28(2):374-382, 2015) proved that Pippel et al.'s (2013) proposed scheme is insecure and proposed an improvement to overcome the drawbacks found in Pipple et al.'s scheme. In this paper, we show that Li et al.'s scheme also vulnerable to the known attacks, namely, password guessing attack, denial of service attack, privileged insider attack and known key secrecy attack. We then propose a secure multi-server authentication scheme to withstand the security pitfalls find in the Li et al.'s scheme while retaining the merits of Li et al.'s scheme. Using the widely accepted BAN logic we show that our scheme provides secure mutual authentication. In addition, we prove that our scheme is secure against all known attacks including password guessing attack, denial of service attack, privileged insider attack and known key secrecy attack. Our scheme requires less communication and computation overhead as compared to the existing related scheme. Our scheme provides high security along with less computation and communication overheads as compared to the other related existing schemes in the literature, and as a result, our scheme is much suitable for practical applications.
引用
收藏
页码:6273 / 6297
页数:25
相关论文
共 50 条
[1]  
Ahn H. S., 2012, WORLD ACAD SCI ENG T, V2012, P45
[2]  
[Anonymous], 1992, MD5 MESSAGE DIGEST A
[3]  
[Anonymous], 1995, Public Law, V100, P235
[4]   An enhanced remote user authentication scheme using smart cards [J].
Awasthi, AK ;
Lal, S .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :583-586
[5]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[6]  
Burrows M., 1989, ACM OPERATING SYSTEM, V23, P1, DOI [10.1145/74851.74852, DOI 10.1145/74851.74852]
[7]  
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P289
[8]   An efficient and secure multi-server password authentication scheme using smart cards [J].
Chang, CC ;
Lee, JS .
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, :417-422
[9]  
DAMGARD IB, 1990, LECT NOTES COMPUT SC, V435, P416
[10]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631