An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment

被引:11
作者
Yu, Yicheng [1 ]
Taylor, Oliver [2 ]
Li, Rui [3 ]
Sunagawa, Baiho [4 ]
机构
[1] Cyberspace Secur Res Ctr, Pengcheng Lab, Shenzhen 518055, Peoples R China
[2] Univ Hull, Sch Engn & Comp Sci, Kingston Upon Hull HU6 7RX, N Humberside, England
[3] Univ Texas Dallas, Dept Elect & Comp Engn, Dallas, TX 75080 USA
[4] Keele Univ, Sch Comp & Math, Newcastle Under Lyme ST5 5BG, England
关键词
authentication; key agreement; three-factor; cryptanalysis; multi-server environment; USER AUTHENTICATION; PROTOCOL; LIGHTWEIGHT; BIOMETRICS; CRYPTANALYSIS; NETWORKS;
D O I
10.3390/math9080798
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
With the increasing number of users and the emergence of different types of network services, a multi-server architecture has emerged in recent years. In order to ensure the secure communication of Internet participants in an open network environment, the authentication and key agreement protocol for multi-server architectures were proposed in the past. In 2018, Chatterjee et al. put forward a lightweight three-factor authentication and key agreement protocol for a multi-server environment, and they claimed that all known security features with satisfactory performance could be realized in their protocol. However, it is found that their scheme is vulnerable to user impersonation attacks and cannot achieve user un-traceability and three-factor security through our cryptanalysis. In order to solve these shortcomings, we propose a new lightweight and anonymous three-factor authentication scheme for the multi-server environment in this article. Furthermore, the proposed protocol is proved to be AKE secure theoretically, and we use BAN-logic to prove that our protocol realizes mutual authentication between communication participants. Finally, we show that our proposed scheme is practical and efficient through the comparison of security features and performance.
引用
收藏
页数:22
相关论文
共 43 条
[1]  
Borja MarioCortina., 2007, Significance, V4, P124, DOI [DOI 10.1111/J.1740-9713.2007.00246.X, 10.1111/j.1740-9713.2007.00246.x]
[2]   An efficient anonymous authentication protocol in multiple server communication networks (EAAM) [J].
Braeken, An ;
Kumar, Pardeep ;
Liyanage, Madhusanka ;
Ta Thi Kim Hue .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (04) :1695-1714
[3]  
Bresson E., 2003, P 10 ACM C COMP COMM
[4]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[5]   Breaking a remote user authentication scheme for multi-server architecture [J].
Cao, Xiang ;
Zhong, Sheng .
IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) :580-581
[6]   Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment [J].
Chatterjee, Santanu ;
Roy, Sandip ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :824-839
[7]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[8]   Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment [J].
Feng, Qi ;
He, Debiao ;
Zeadally, Sherali ;
Wang, Huaqun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :239-251
[9]   A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT [J].
Fotouhi, Mahdi ;
Bayat, Majid ;
Das, Ashok Kumar ;
Far, Hossein Abdi Nasib ;
Pournaghi, S. Morteza ;
Doostari, M. A. .
COMPUTER NETWORKS, 2020, 177
[10]   Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing [J].
Fu, Zhangjie ;
Sun, Xingming ;
Liu, Qi ;
Zhou, Lu ;
Shu, Jiangang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) :190-200