An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

被引:39
作者
Reddy, Alavalapati Goutham [1 ]
Das, Ashok Kumar [2 ]
Odelu, Vanga [3 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad, Andhra Pradesh, India
[3] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
PASSWORD AUTHENTICATION; PROVABLY SECURE; SMART-CARD; SCHEME; EFFICIENT;
D O I
10.1371/journal.pone.0154308
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
引用
收藏
页数:28
相关论文
共 56 条
[1]   An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[2]  
[Anonymous], SPAN SEC PROT AN AVI
[3]  
[Anonymous], 2014, INFORM SCI LETT, DOI DOI 10.12785/ISL/030105
[4]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[5]   An enhanced remote user authentication scheme using smart cards [J].
Awasthi, AK ;
Lal, S .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :583-586
[6]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[7]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[8]   A two-factor authentication scheme with anonymity for multi-server environments [J].
Chen, Chi-Tung ;
Lee, Cheng-Chi .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) :1608-1625
[9]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[10]   An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics [J].
Chuang, Ming-Chin ;
Chen, Meng Chang .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) :1411-1418