A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications

被引:5
作者
Li, Xuelei [1 ]
Wen, Qiaoyan [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Authentication; Key agreement; Anonymous; Privacy; Security; SMART CARDS; BIOMETRIC AUTHENTICATION; EFFICIENT;
D O I
10.1007/s11277-015-3008-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Anonymous remote user authentication plays more and more important role in wireless personal communication networks to guarantee systematic security and personal privacy. However, as promising as it is, security and privacy issues have seriously challenged user experience and system performance in the authentication schemes for a long time. In this paper, we propose a remote user authentication scheme for wireless communication networks. Our proposal employs the personal workstation as a trusted proxy to preserve perfect user privacy, while maintaining system security. It not only provides mutual authentication with key agreement mechanism, but also keeps user' privacy private in a reliable domain. In addition, the technologies of Bluetooth (or Wifi) improve user experience and improve user friendliness in three-factor based authentication schemes. Moreover, our scheme supports flexible user login and security level. Finally, the security proof and performance analysis show that our scheme is more efficient and practical.
引用
收藏
页码:1593 / 1610
页数:18
相关论文
共 20 条
  • [1] [Anonymous], P 1 ANN INT C MOB CO
  • [2] An improved timestamp-based remote user authentication scheme
    Awasthi, Amit K.
    Srivastava, Keerti
    Mittal, R. C.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (06) : 869 - 874
  • [3] The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
    Bonneau, Joseph
    Herley, Cormac
    van Oorschot, Paul C.
    Stajano, Frank
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 553 - 567
  • [4] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [5] An efficient and practical solution to remote authentication: Smart card
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. COMPUTERS & SECURITY, 2002, 21 (04) : 372 - 375
  • [6] Czeskis Alexei., 2012, ACM CCS
  • [7] Dietz M., 2012, P 21 USENIX SEC S
  • [8] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [9] Halevi S., 1999, ACM Trans. Inf. Syst. Secur, V2, P230
  • [10] A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems
    Huang, Xinyi
    Xiang, Yang
    Chonka, Ashley
    Zhou, Jianying
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (08) : 1390 - 1397