Provable analysis and improvement of smart card-based anonymous authentication protocols

被引:1
作者
Far, Saeed Banaeian [1 ]
Alagheband, Mahdi R. [1 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Elect & Comp Engn, Tehran, Iran
关键词
authentication protocol; privacy; smart card; user anonymity; KEY AGREEMENT SCHEME; BIOMETRICS; DESIGN;
D O I
10.1002/dac.3542
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, authentication protocols are essential for secure communications specially for roaming networks, distributed computer networks, and remote wireless communication. The numerous users in these networks rise vulnerabilities. Thus, privacy-preserving methods have to be run to provide more reliable services and sustain privacy. Anonymous authentication is a method to remotely authenticate users with no revelation about their identity. In this paper, we analyze 2 smart card-based protocols that the user's identity is anonymous. However, we represent that they are vulnerable to privileged insider attack. It means that the servers can compromise the users' identity for breaking their privacy. Also, we highlight that the Wen et al protocol has flaws in both stolen smart card and stolen server attacks and the Odelu et al protocol is traceable. Then, we propose 2 modified anonymous authentication protocols. Finally, we analyze our improved protocols with both heuristic and formal methods.
引用
收藏
页数:23
相关论文
共 34 条
[1]  
Anderson R, 2002, UCAMCLTR549
[2]  
Andrew Yl, 2007, BLACK HAT
[3]  
[Anonymous], 1985, C THEOR APPL CRYPT T
[4]  
Bapana S, 2014, 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), P1296, DOI 10.1109/IC3I.2014.7019600
[5]   A two-factor authentication scheme with anonymity for multi-server environments [J].
Chen, Chi-Tung ;
Lee, Cheng-Chi .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) :1608-1625
[6]   A practical authentication protocol with anonymity for wireless access networks [J].
Chen, Yen-Cheng ;
Chuang, Shu-Chuan ;
Yeh, Lo-Yao ;
Huang, Jiun-Long .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (10) :1366-1375
[7]   Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem [J].
Das, Ashok Kumar ;
Paul, Nayan Ranjan ;
Tripathy, Laxminath .
INFORMATION SCIENCES, 2012, 209 :80-92
[8]   User authentication scheme preserving anonymity for ubiquitous devices [J].
Djellali, Benchaa ;
Belarbi, Kheira ;
Chouarfia, Abdallah ;
Lorenz, Pascal .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) :3131-3141
[9]   Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE SYSTEMS JOURNAL, 2016, 10 (04) :1370-1379
[10]  
Helary J.-M., 1988, Proceedings: Workshop on the Future Trends of Distributed Computing Systems in the 1990s (Cat. No.88TH0228-7), P82, DOI 10.1109/FTDCS.1988.26683