A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards

被引:324
作者
Odelu, Vanga [1 ]
Das, Ashok Kumar [2 ]
Goswami, Adrijit [1 ]
机构
[1] IIT Kharagpur, Dept Math, Kharagpur 721302, W Bengal, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
关键词
Security; authentication; smart card; revocation and re-registration; BAN logic; AVISPA; KEY AGREEMENT; PASSWORD AUTHENTICATION; SCHEME; IMPROVEMENT; PRIVACY; CRYPTANALYSIS; EFFICIENT; ROBUST;
D O I
10.1109/TIFS.2015.2439964
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this paper, we first analyze He-Wang's scheme and show that their scheme is vulnerable to a known session-specific temporary information attack and impersonation attack. In addition, we show that their scheme does not provide strong user's anonymity. Furthermore, He-Wang's scheme cannot provide the user revocation facility when the smart card is lost/stolen or user's authentication parameter is revealed. Apart from these, He-Wang's scheme has some design flaws, such as wrong password login and its consequences, and wrong password update during password change phase. We then propose a new secure multi-server authentication protocol using biometric-based smart card and ECC with more security functionalities. Using the Burrows-Abadi-Needham logic, we show that our scheme provides secure authentication. In addition, we simulate our scheme for the formal security verification using the widely accepted and used automated validation of Internet security protocols and applications tool, and show that our scheme is secure against passive and active attacks. Our scheme provides high security along with low communication cost, computational cost, and variety of security features. As a result, our scheme is very suitable for battery-limited mobile devices as compared with He-Wang's scheme.
引用
收藏
页码:1953 / 1966
页数:14
相关论文
共 50 条
  • [1] Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges
    Abolfazli, Saeid
    Sanaei, Zohreh
    Ahmed, Ejaz
    Gani, Abdullah
    Buyya, Rajkumar
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 337 - 368
  • [2] [Anonymous], IEEE T DEPE IN PRESS
  • [3] [Anonymous], IACR CRYPTOLOGY
  • [4] [Anonymous], 1995, FIPS PUB
  • [5] [Anonymous], IEEE SYST J IN PRESS
  • [6] Basin D., 2004, Int. J. Inf. Secur, V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
  • [7] Bellare M., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P419, DOI 10.1145/276698.276854
  • [8] Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
    Brickell, Ernie
    Li, Jiangtao
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 345 - 360
  • [9] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
  • [10] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453