A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments

被引:34
作者
Amin, Ruhul [1 ]
Islam, S. K. Hafizul [2 ]
Khan, Muhammad Khurram [3 ]
Karati, Arijit [4 ]
Giri, Debasis [5 ]
Kumari, Saru [6 ]
机构
[1] Thapar Univ, Comp Sci & Engn, Patiala 147004, Punjab, India
[2] Indian Inst Informat Technol Kalyani, Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
[4] NIIT Univ, Comp Sci & Engn, Neemrana 301705, Rajasthan, India
[5] Haldia Inst Technol, Comp Sci & Engn, Haldia 721657, W Bengal, India
[6] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
CERTIFIED PUBLIC KEYS; USER AUTHENTICATION; AGREEMENT SCHEME; PROVABLY SECURE; PROTOCOL; DESIGN;
D O I
10.1155/2017/5989151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of two-factor multiserver authentication protocol was developed to avoid multiple number of registrations using multiple smart-cards and passwords. Recently, a variety of two-factor multiserver authentication protocols have been developed. It is observed that the existing RSA-based multiserver authentication protocols are not suitable in terms of computation complexities and security attacks. To provide lower complexities and security resilience against known attacks, this article proposes a two-factor (password and smart-card) user authentication protocol with the RSA cryptosystem for multiserver environments. The comprehensive security discussion proved that the known security attacks are eliminated in our protocol. Besides, our protocol supports session key agreement and mutual authentication between the application server and the user. We analyze the proof of correctness of the mutual authentication and freshness of session key using the BAN logic model. The experimental outcomes obtained through simulation of the Automated Validation of Internet Security Protocols and Applications (AVISPA) S/W show that our protocol is secured. We consider the computation, communication, and storage costs and the comparative explanations show that our protocol is flexible and efficient compared with protocols. In addition, our protocol offers security resilience against known attacks and provides lower computation complexities than existing protocols. Additionally, the protocol offers password change facility to the authorized user.
引用
收藏
页数:15
相关论文
共 36 条
[1]  
Amin R., 2015, P COMPUTER COMMUNICA, P1
[2]  
Amin R, 2015, 2015 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA)
[3]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[4]   Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card [J].
Amin, Ruhul ;
Biswas, G. P. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (11) :3135-3149
[5]   Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment [J].
Amin, Ruhul ;
Biswas, G. P. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) :439-462
[6]   Remote Access Control Mechanism Using Rabin Public Key Cryptosystem [J].
Amin, Ruhul ;
Biswas, G. P. .
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 :525-533
[7]  
[Anonymous], 2013, INT J COMPUTER APPL
[8]  
[Anonymous], 2013, INT J COMPUTER APPL
[9]  
[Anonymous], 2014, INFORM SCI LETT, DOI DOI 10.12785/ISL/030105
[10]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281