Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Expert systems with applications, 2014-12, Vol.41 (18), p.8129-8143
2014
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
Ist Teil von
  • Expert systems with applications, 2014-12, Vol.41 (18), p.8129-8143
Ort / Verlag
Amsterdam: Elsevier Ltd
Erscheinungsjahr
2014
Quelle
Alma/SFX Local Collection
Beschreibungen/Notizen
  • •We analyze recently proposed Chuang and Chen’s scheme for multi-server environment.•We show that their scheme is still vulnerable to different known attacks.•We then propose an improved scheme with user anonymity and low computation overhead.•Formal and informal security analysis/verification show that our scheme is secure.•High security and low overhead make our scheme suitable for practical applications. Advancement in communication technology provides a scalable platform for various services, where a remote user can access the server from anywhere without moving from its place. It provides a unique opportunity for online services such that a user does not need to be physically present at the service center. These services adopt authentication and key agreement protocols in order to ensure authorized and secure access to the resources. Most of the authentication schemes proposed in the literature support a single-server environment, where the user has to register with each server. If a user wishes to access multiple application servers, he/she requires to register with each server. The multi-server authentication introduces a scalable platform such that a user can interact with any server using single registration. Recently, Chuang and Chen proposed an efficient multi-server authenticated key agreement scheme based on a user’s password and biometrics (Chuang and Chen, 2014). Their scheme is a lightweight, which requires the computation of only hash functions. In this paper, we first analyze Chuang and Chen’s scheme and then identify that their scheme does not resist stolen smart card attack which causes the user’s impersonation attack and server spoofing attack. We also show that their scheme fails to protect denial-of-service attack. We aim to propose an efficient improvement on Chuang and Chen’s scheme to overcome the weaknesses of their scheme, while also retaining the original merits of their scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against various known attacks including the attacks found in Chuang and Chen’s scheme. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against the replay and man-in-the-middle attacks. In addition, our scheme is comparable in terms of the communication and computational overheads with Chuang and Chen’s scheme and other related existing schemes.

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX