首页> 外文期刊>Expert Systems with Application >A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
【24h】

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards

机译:使用智能卡的基于用户身份的安全的基于用户身份的安全多服务器认证密钥协商方案

获取原文
获取原文并翻译 | 示例

摘要

Advancement in communication technology provides a scalable platform for various services, where a remote user can access the server from anywhere without moving from its place. It provides a unique opportunity for online services such that a user does not need to be physically present at the service center. These services adopt authentication and key agreement protocols in order to ensure authorized and secure access to the resources. Most of the authentication schemes proposed in the literature support a single-server environment, where the user has to register with each server. If a user wishes to access multiple application servers, he/she requires to register with each server. The multi-server authentication introduces a scalable platform such that a user can interact with any server using single registration. Recently, Chuang and Chen proposed an efficient multi-server authenticated key agreement scheme based on a user's password and biometrics (Chuang and Chen, 2014). Their scheme is a lightweight, which requires the computation of only hash functions. In this paper, we first analyze Chuang and Chen's scheme and then identify that their scheme does not resist stolen smart card attack which causes the user's impersonation attack and server spoofing attack. We also show that their scheme fails to protect denial-of-ser-vice attack. We aim to propose an efficient improvement on Chuang and Chen's scheme to overcome the weaknesses of their scheme, while also retaining the original merits of their scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against various known attacks including the attacks found in Chuang and Chen's scheme. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against the replay and man-in-the-middle attacks. In addition, our scheme is comparable in terms of the communication and computational overheads with Chuang and Chen's scheme and other related existing schemes.
机译:通信技术的进步为各种服务提供了一个可扩展的平台,远程用户可以在任何地方访问服务器而无需从其位置移动服务器。它为在线服务提供了独特的机会,因此用户无需实际出现在服务中心。这些服务采用身份验证和密钥协商协议,以确保对资源的授权和安全访问。文献中提出的大多数身份验证方案都支持单服务器环境,用户必须在其中向每个服务器注册。如果用户希望访问多个应用程序服务器,则他/她需要在每个服务器上注册。多服务器身份验证引入了可扩展的平台,以便用户可以使用单个注册与任何服务器进行交互。最近,Chuang和Chen提出了一种基于用户密码和生物特征的高效多服务器身份验证密钥协商方案(Chuang和Chen,2014)。他们的方案是轻量级的,只需要计算哈希函数即可。在本文中,我们首先分析了Chuang和Chen的方案,然后确定他们的方案不能抵抗被盗的智能卡攻击,后者会导致用户的模拟攻击和服务器欺骗攻击。我们还表明,他们的方案无法保护拒绝服务攻击。我们旨在对Chuang and Chen的方案提出有效的改进,以克服其方案的弱点,同时保留其方案的原有优点。通过严格的非正式和正式安全分析,我们证明了我们的计划对于各种已知的攻击都是安全的,包括在Chuang和Chen的计划中发现的攻击。此外,我们使用广为接受的AVISPA(Internet安全协议和应用程序的自动验证)工具模拟了用于正式安全验证的方案,并表明我们的方案可防止重放和中间人攻击。另外,我们的方案在通信和计算开销方面可与Chuang and Chen方案以及其他相关现有方案相媲美。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号