A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment

被引:21
作者
Meshram, Chandrashekhar [1 ]
Ibrahim, Rabha W. [2 ]
Deng, Lunzhi [3 ]
Shende, Shailendra W. [4 ]
Meshram, Sarita Gajbhiye [5 ]
Barve, Sharad Kumar [1 ]
机构
[1] Coll Chhindwara Univ, Jaywanti Haksar Govt Postgrad Coll, Dept Post Grad Studies & Res Math, Betul 480001, Madhya Pradesh, India
[2] IEEE 94086547, Kuala Lumpur 59200, Malaysia
[3] Guizhou Normal Univ, Sch Math Sci, Guiyang, Peoples R China
[4] Yeshwantrao Chavan Coll Engn, Dept Informat Technol, Nagpur, Maharashtra, India
[5] Ton Duc Thang Univ, Dept Management Sci & Technol Dev, Ho Chi Minh City, Vietnam
关键词
Mutual authentication; Session key; Smart card; Extended chaotic map; Perfect forward secrecy; Hash function; BAN logic; IoT; Smart city; CRYPTANALYSIS; SECURITY;
D O I
10.1007/s00500-021-05929-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The idea of an internet of things (IoT)-based smart city evolves with the aim of improving the quality of citizens' lives through the practice of data and announcement (such as email, connection, etc.) tools. The idea of smart cities is believed to be feasible through the incorporation of new technologies such as IoT, automation and machine learning in which IoT plays a key role. When billions of slight strategies drive online and start sharing their information, confirmation has already described as a major security issue nearby the IoT. To exacerbate things, as internet technology advances, advanced hacker methods and new forms of threats arise after each other. It is, therefore, necessary to create efficient authentication protocol that is simpler and easier in order to free users from their anxiety and enhance their user experience. Smart card-based key authentication protocols have formed the normal in the latest years, featuring their exceptionally lightweight, easy-to-use equipment and low-cost apps. We proposed an efficient robust authentication protocol using the extended chaotic map in this article. The security of the proposed authentication protocol formally and informally evaluated to demonstrate robustness. Examination of the quality of the proposed authentication protocol has also given sufficient care of demonstrating the possibility of application in real-time requests.
引用
收藏
页码:10037 / 10051
页数:15
相关论文
共 44 条
[1]   A new Identity Based Encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp [J].
Algehawi, Mohammed Benasser ;
Samsudin, Azman .
PHYSICS LETTERS A, 2010, 374 (46) :4670-4674
[2]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[3]  
Burns E, 2016, SMART CITY
[4]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[5]   A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards [J].
Chang, Chin-Chen ;
Cheng, Ting-Fang ;
Hsueh, Wei-Yuan .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (02) :290-306
[6]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389
[7]   Lightweight and provably secure user authentication with anonymity for the global mobility network [J].
Chen, Chun ;
He, Daojing ;
Chan, Sammy ;
Bu, Jiajun ;
Gao, Yi ;
Fan, Rong .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (03) :347-362
[8]   Period distribution analysis of some linear maps [J].
Chen, Fei ;
Liao, Xiaofeng ;
Wong, Kwok-wo ;
Han, Qi ;
Li, Yang .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (10) :3848-3856
[9]   A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function [J].
Das, Ashok Kumar ;
Odelu, Vanga ;
Goswami, Adrijit .
SCIENTIFIC WORLD JOURNAL, 2014,
[10]   An improved password-based authentication scheme for session initiation protocol using smart cards without verification table [J].
Farash, Mohammad Sabsinejad .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)