A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme

被引:21
作者
Chaturvedi, Ankita [1 ]
Mishra, Dheerendra [2 ]
Jangirala, Srinivas [1 ]
Mukhopadhyay, Sourav [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
[2] LNM Inst Informat Technol, Dept Math, Jaipur 302031, Rajasthan, India
关键词
Internet of Things; Authentication; Key agreement; Smart card; Biometric; Privacy; IMPROVEMENT; CRYPTANALYSIS; EFFICIENT; INFORMATION; ENCRYPTION; SECURITY; PROTOCOL;
D O I
10.1016/j.jisa.2016.11.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advancement in Internet of Things (IOT) and remote user communication is facilitated, where a user need not be physically present. However, security and privacy challenges arrive as client-server communication is done via public network. To lower down the security and privacy threats, authentication and key agreement (AKA) protocols are being designed and analyzed. AKA protocols' goal is to ensure authorized and secure access of recourses. Recently, Li et al. proposed a biometric based three-factor remote user authentication scheme for client-server environment. Their scheme uses biometric identifier to resist guessing attacks. In this article, we discussed the security of Li et al.'s scheme, and show its vulnerability to known session specific temporary information attack. Additionally, it does not provide three-factor authentication and user's privacy. It also has some flows in authentication phase. We proposed a novel AKA protocol, which can overcome the weaknesses of Li et al.'s scheme without losing its original merits. Through the analysis, we show that our scheme is secure against various known attacks including the attacks found in Li et al.'s scheme. Furthermore, we demonstrate the validity of the proposed scheme using the BAN (Burrows, Abadi, and Needham) logic. Our scheme is also comparable in terms of computation overheads with Li et al.'s scheme and other related schemes. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:15 / 26
页数:12
相关论文
共 50 条
[11]  
Chaturvedi Ankita, 2013, Information Systems Security. 9th International Conference, ICISS 2013. Proceedings: LNCS 8303, P63, DOI 10.1007/978-3-642-45204-8_5
[12]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389
[13]   Towards secure and efficient user authentication scheme using smart card for multi-server environments [J].
Chen, Te-Yu ;
Lee, Cheng-Chi ;
Hwang, Min-Shiang ;
Jan, Jinn-Ke .
JOURNAL OF SUPERCOMPUTING, 2013, 66 (02) :1008-1032
[14]  
Cheng-Chi Lee, 2011, WSEAS Transactions on Communications, V10, P193
[15]  
Clark J., 1997, SURVEY AUTHENTICATIO
[16]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[17]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[18]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[19]  
Eisenbarth T, 2008, LECT NOTES COMPUT SC, V5157, P203, DOI 10.1007/978-3-540-85174-5_12
[20]  
Eldefrawy M. H., 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification (2010 ASID), P1, DOI 10.1109/ICASID.2010.5551480