Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment

被引:24
作者
Ali, Rifaqat [1 ]
Pal, Arup Kumar [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Indian Sch Mines, Dhanbad 826004, Jharkhand, India
关键词
Authentication; AVISPA; BAN logic; Random oracle model; Security attacks; KEY-AGREEMENT; SECURE; PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; DESIGN;
D O I
10.1007/s13369-017-2665-1
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Recently, Guo-Wen projected an improved authentication protocol in multi-server environment, proclaiming it to preserve user anonymity. However, the authors revisit Guo-Wen's protocol and discover various malicious threats, i.e., (1) password guessing threat, (2) identity guessing threat, (3) new smartcard issue threat, (4) user impersonation threat, (5) known session-key temporary information threat and (6) privilege insider threat. In order to surmount theses above-mentioned threats, we propose an enhanced and robust three-factor-based confidentiality-preserving authentication protocol in multi-server environment. The BAN (Burrows, Abadi, Needham) logic is used for validating our scheme which ensures the mutual authentication and session-key negotiation are securely generated. Thereafter, applied random oracle model demonstrates the backbone parameters (like identity, password, biometric and session key) of our protocol are highly secured. Further, the discussion of informal security analysis reveals that the scheme withstands several types of malicious attacks. Besides, we simulate our scheme with the help of AVISPA (Automated Validation of Internet Security Protocol and Applications) tool which demonstrates that it resists to various active and passive attacks. In addition, the performance evaluation exhibits the efficiency in regard to communication and computation costs and estimated time of our scheme is comparatively less with other related existing works.
引用
收藏
页码:3655 / 3672
页数:18
相关论文
共 44 条
[1]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[2]   Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card [J].
Amin, Ruhul ;
Biswas, G. P. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (11) :3135-3149
[3]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[4]   A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC [J].
Chandrakar, Preeti ;
Om, Hari .
COMPUTER COMMUNICATIONS, 2017, 110 :26-34
[5]   Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment [J].
Chandrakar, Preeti ;
Om, Hari .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (12)
[6]   Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment [J].
Chandrakar, Preeti ;
Om, Hari .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) :765-786
[7]   Design of a secure smart card-based multi-server authentication scheme [J].
Chaturvedi, Ankita ;
Das, Ashok Kumar ;
Mishra, Dheerendra ;
Mukhopadhyay, Sourav .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 30 :64-80
[9]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389
[10]   An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics [J].
Chuang, Ming-Chin ;
Chen, Meng Chang .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) :1411-1418