Secure server-server communication for dual stage biometrics - based password authentication scheme

被引:4
作者
Boopathi, Mythili [1 ]
Aramudhan, M. [2 ]
机构
[1] Vellore Inst Technol, Sch Informat Technol, Vellore 632014, Tamil Nadu, India
[2] Perunthalaivar Kamarajar Inst Engn & Technol, Dept Informat Technol, Karaikal 609603, India
关键词
Authentication; Security; Server; Biometric; Protocol; ELLIPTIC CURVE CRYPTOGRAPHY; SMART CARDS; KEY AGREEMENT; REMOTE AUTHENTICATION; EFFICIENT; ROBUST; IMPROVEMENTS; ENHANCEMENT; ANONYMITY; PROTOCOL;
D O I
10.1016/j.aej.2017.01.031
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The distributed environment insists the protection of servers, while information sharing is achieved. The conventional biometrics-based password authentication mechanisms use single server, which can be compromised easily. The dual stage authentication mechanism has been already proved for its security over the single stage authentication mechanism in our previous work. In this paper, the protocol is improved to establish communication between the authentication server and the master server through a secure link. Since the hashed messages are prone to collision attacks, the proposed scheme uses elliptic curve cryptography-based ciphers for establishing connection at the initial stage. The security analysis of the proposed authentication scheme with secure server server communication link reveals the robustness and the security features, which are offered over our previous as well as the conventional authentication mechanisms. (C) 2017 Faculty of Engineering, Alexandria University. Production and hosting by Elsevier B.V.
引用
收藏
页码:819 / 829
页数:11
相关论文
共 35 条
  • [1] Bond M., 2014, P IEEE S P 2014, P1
  • [2] Security enhancement of an IC-card-based remote login mechanism
    Cheng, Ting-Fang
    Lee, Jung-San
    Chang, Chin-Chen
    [J]. COMPUTER NETWORKS, 2007, 51 (09) : 2280 - 2287
  • [3] An efficient and practical solution to remote authentication: Smart card
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. COMPUTERS & SECURITY, 2002, 21 (04) : 372 - 375
  • [4] The importance of proofs of security for key establishment protocols - Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
    Choo, Kim-Kwang Raymond
    Boyd, Colin
    Hitchcock, Yvonne
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2788 - 2797
  • [5] Robust remote authentication scheme with smart cards
    Fan, CI
    Chan, YC
    Zhang, ZK
    [J]. COMPUTERS & SECURITY, 2005, 24 (08) : 619 - 628
  • [6] Ferguson Niels, 2003, PRACTICAL CRYPTOGRAP, P30
  • [7] User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
    Gunson, Nancie
    Marshall, Diarmid
    Morton, Hazel
    Jack, Mervyn
    [J]. COMPUTERS & SECURITY, 2011, 30 (04) : 208 - 220
  • [8] Robust Biometrics-Based Authentication Scheme for Multiserver Environment
    He, Debiao
    Wang, Ding
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 816 - 823
  • [9] Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems
    Huang, Xinyi
    Chen, Xiaofeng
    Li, Jin
    Xiang, Yang
    Xu, Li
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) : 1767 - 1775
  • [10] A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems
    Huang, Xinyi
    Xiang, Yang
    Chonka, Ashley
    Zhou, Jianying
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (08) : 1390 - 1397