A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards

被引:184
作者
Mishra, Dheerendra [1 ]
Das, Ashok Kumar [2 ]
Mukhopadhyay, Sourav [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
关键词
Remote user authentication; Multi-server; Smart card; Biometrics; User anonymity; Security; AVISPA; ACCESS-CONTROL; POWER ANALYSIS; EFFICIENT; IMPROVEMENT; CRYPTANALYSIS;
D O I
10.1016/j.eswa.2014.07.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advancement in communication technology provides a scalable platform for various services, where a remote user can access the server from anywhere without moving from its place. It provides a unique opportunity for online services such that a user does not need to be physically present at the service center. These services adopt authentication and key agreement protocols in order to ensure authorized and secure access to the resources. Most of the authentication schemes proposed in the literature support a single-server environment, where the user has to register with each server. If a user wishes to access multiple application servers, he/she requires to register with each server. The multi-server authentication introduces a scalable platform such that a user can interact with any server using single registration. Recently, Chuang and Chen proposed an efficient multi-server authenticated key agreement scheme based on a user's password and biometrics (Chuang and Chen, 2014). Their scheme is a lightweight, which requires the computation of only hash functions. In this paper, we first analyze Chuang and Chen's scheme and then identify that their scheme does not resist stolen smart card attack which causes the user's impersonation attack and server spoofing attack. We also show that their scheme fails to protect denial-of-service attack. We aim to propose an efficient improvement on Chuang and Chen's scheme to overcome the weaknesses of their scheme, while also retaining the original merits of their scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against various known attacks including the attacks found in Chuang and Chen's scheme. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against the replay and man-in-the-middle attacks. In addition, our scheme is comparable in terms of the communication and computational overheads with Chuang and Chen's scheme and other related existing schemes. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:8129 / 8143
页数:15
相关论文
共 56 条
[1]  
[Anonymous], 2011, 2011365 CRYPT EPRINT
[2]  
[Anonymous], 1990, P THE 2 C INNOVATIVE
[3]  
[Anonymous], 2005, P APPSEM 2005 WORKSH
[4]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[5]  
Aumasson JP, 2010, LECT NOTES COMPUT SC, V6225, P1, DOI 10.1007/978-3-642-15031-9_1
[6]  
AVISPA, 2014, AVISPA WEB TOOL
[7]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[8]  
Belguechi R., 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P1168, DOI 10.1109/ICPR.2010.292
[9]  
Boyd Colin., 2003, INF SECUR CRYTOGR
[10]   Breaking a remote user authentication scheme for multi-server architecture [J].
Cao, Xiang ;
Zhong, Sheng .
IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) :580-581