An Improved User Authentication Protocol Based on Chaotic Maps for Multiserver Environment

被引:0
作者
Kumar, Devender [1 ]
Chand, Satish [2 ]
Kumar, Bijendra [3 ]
机构
[1] NSUT, Dept Informat Technol, New Delhi, India
[2] JNU, Sch Comp & Syst Sci, New Delhi, India
[3] NSUT, Dept Comp Sci & Engn, New Delhi, India
来源
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY | 2021年 / 24卷 / 01期
关键词
User authentication; smart card; session key agreement; multiserver environment; chaotic maps; PASSWORD AUTHENTICATION; SCHEME; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Now-a-days researchers have focused on designing authentication schemes using smart card because of advancement in computer and communication technologies. Recently, Li et al. have discussed a protocol for multiserver environment based on chaotic maps. We analyze its security and find that it is not resistant to the privileged insider and smart card loss attacks besides user anonymity. Here, we propose an improved user authentication protocol for multiserver environment using the chaotic maps to overcome these limitations. We formally prove using BAN logic that our protocol provides mutual authentication. We show its formal security analysis using random oracle and discuss its informal security analysis to show that it is resistance to the various known attacks. We simulate our protocol using AVISPA tool to verify its security against active and passive attacks. Our protocol is more secure than the existing protocols.
引用
收藏
页码:58 / 78
页数:21
相关论文
共 39 条
[1]  
[Anonymous], 2002, Qualitative researching
[2]  
AVISPA, AVISPA: Automated validation of Internet security protocols and applications
[3]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[4]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[5]   A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC [J].
Chandrakar, Preeti ;
Om, Hari .
COMPUTER COMMUNICATIONS, 2017, 110 :26-34
[6]   An efficient and secure multi-server password authentication scheme using smart cards [J].
Chang, CC ;
Lee, JS .
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, :417-422
[7]  
Chen Y., 2008, IACR CRYPTOLOGY EPRI, V2008, P544
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208