A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme

被引:21
作者
Chaturvedi, Ankita [1 ]
Mishra, Dheerendra [2 ]
Jangirala, Srinivas [1 ]
Mukhopadhyay, Sourav [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
[2] LNM Inst Informat Technol, Dept Math, Jaipur 302031, Rajasthan, India
关键词
Internet of Things; Authentication; Key agreement; Smart card; Biometric; Privacy; IMPROVEMENT; CRYPTANALYSIS; EFFICIENT; INFORMATION; ENCRYPTION; SECURITY; PROTOCOL;
D O I
10.1016/j.jisa.2016.11.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advancement in Internet of Things (IOT) and remote user communication is facilitated, where a user need not be physically present. However, security and privacy challenges arrive as client-server communication is done via public network. To lower down the security and privacy threats, authentication and key agreement (AKA) protocols are being designed and analyzed. AKA protocols' goal is to ensure authorized and secure access of recourses. Recently, Li et al. proposed a biometric based three-factor remote user authentication scheme for client-server environment. Their scheme uses biometric identifier to resist guessing attacks. In this article, we discussed the security of Li et al.'s scheme, and show its vulnerability to known session specific temporary information attack. Additionally, it does not provide three-factor authentication and user's privacy. It also has some flows in authentication phase. We proposed a novel AKA protocol, which can overcome the weaknesses of Li et al.'s scheme without losing its original merits. Through the analysis, we show that our scheme is secure against various known attacks including the attacks found in Li et al.'s scheme. Furthermore, we demonstrate the validity of the proposed scheme using the BAN (Burrows, Abadi, and Needham) logic. Our scheme is also comparable in terms of computation overheads with Li et al.'s scheme and other related schemes. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:15 / 26
页数:12
相关论文
共 50 条
[1]   Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Li, Xiong .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[2]  
An Y, 2012, COMM COM INF SC, V351, P307
[3]   Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards [J].
An, Younghwa .
JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY, 2012,
[4]  
[Anonymous], P 3 ANN ACM BANG C
[5]  
[Anonymous], 2012, 3 INT C COMP COMM NE
[6]  
[Anonymous], KEY AGREEMENT PROTOC
[7]  
Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1556, P339
[8]  
Boyd Colin., 2003, INF SECUR CRYTOGR
[9]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[10]   Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update [J].
Chang, Ya-Fen ;
Tai, Wei-Liang ;
Chang, Hung-Chin .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) :3430-3440