Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks

被引:54
作者
ul Haq, Inam [1 ]
Wang, Jian [1 ]
Zhu, Youwen [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut NUAA, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
关键词
Multi-server architecture; Crypt-analysis; User impersonation attack; Self-certified public key; Light weight; AGREEMENT SCHEME; CHAOTIC MAP; EFFICIENT; ARCHITECTURE; ENVIRONMENT; BIOMETRICS; DESIGN;
D O I
10.1016/j.jnca.2020.102660
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently Ying and Nayak proposed a multi-server supported lightweight authentication protocol for 5G networks and confirmed the security of their protocol against all prominent attacks. Nevertheless, this paper will show certain shortcomings in their protocol, like vulnerability against identity guessing, password guessing, and user impersonation attacks. Additionally, it lacks in rendering strong user anonymity and truly two-factor security. Following the crypt-analysis, we propose an improved multi-server authentication protocol, that resists all recognized attacks, including these traps. The formal analysis using broadly accepted BAN-logic assures that the proposed protocol provides mutual authentication among the user and service-providing server. Additionally, the automated verification using the "Automated Validation of Internet Security Protocols and Applications" (AVISPA) tool asserts that improved protocol is safe toward active attacks. The performance comparison with the Ying-Nayak's protocol is evident that the proposed protocol is efficient concerning computational complexity and communication costs.
引用
收藏
页数:11
相关论文
共 52 条
[11]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[12]  
Fan Wu, 2018, Frontier Computing. Theory, Technologies and Applications (FC 2017). LNEE 464, P335, DOI 10.1007/978-981-10-7398-4_35
[13]   Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment [J].
Feng, Qi ;
He, Debiao ;
Zeadally, Sherali ;
Wang, Huaqun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :239-251
[14]   A Survey of 5G Network: Architecture and Emerging Technologies [J].
Gupta, Akhil ;
Jha, Rakesh Kumar .
IEEE ACCESS, 2015, 3 :1206-1232
[15]   Hash Based Multi-server Key Exchange Protocol Using Smart Card [J].
Gupta, Prakash Chand ;
Dhar, Joydip .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (01) :225-244
[16]   Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Wu, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :2052-2064
[17]   Robust Biometrics-Based Authentication Scheme for Multiserver Environment [J].
He, Debiao ;
Wang, Ding .
IEEE SYSTEMS JOURNAL, 2015, 9 (03) :816-823
[18]   An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures [J].
Hsieh, Wen-Bin ;
Leu, Jenq-Shiou .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (01) :133-148
[19]   An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture [J].
Irshad, Azeem ;
Chaudhry, Shehzad Ashraf ;
Xie, Qi ;
Li, Xiong ;
Farash, Mohammad Sabzinejad ;
Kumari, Saru ;
Wu, Fan .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :811-828
[20]   An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre [J].
Irshad, Azeem ;
Sher, Muhammad ;
Chaudhary, Shehzad Ashraf ;
Naqvi, Husnain ;
Farash, Mohammad Sabzinejad .
JOURNAL OF SUPERCOMPUTING, 2016, 72 (04) :1623-1644