Skip to main content

2018 | OriginalPaper | Buchkapitel

A New Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Multi-server Environment

verfasst von : Fan Wu, Lili Xu, Xiong Li

Erschienen in: Frontier Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The explosive usage of Internet and telecommunications makes the remote server access mechanism necessary. Multi-server architecture mixes various services into one system. A user can get different services from different providers after registering on one registration center. To protect the information transmitted in the sessions, authentication is naturally considered. In the past decades, many multi-server authentication schemes have been presented. But unfortunately, various sorts of attacks are presented to prove the past schemes insecure. To prevent the common attacks, we give a new two-factor authentication scheme for multi-server systems. Through the analysis of security properties and performance, all can see that the proposed scheme is against the common attacks, such as off-line guessing attacks, tracking attacks, etc. And it is suitable for application in real circumstance. ...

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks. Multimed. Tools Appl. 75, 12705–12725 (2015)CrossRef Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks. Multimed. Tools Appl. 75, 12705–12725 (2015)CrossRef
3.
Zurück zum Zitat He, D., Kumar, N., Shen, H., Lee, J.H.: One-to-many authentication for access control in mobile pay-TV systems. Sci. China Inf. Sci. 59(5), 1–14 (2015)MathSciNetCrossRef He, D., Kumar, N., Shen, H., Lee, J.H.: One-to-many authentication for access control in mobile pay-TV systems. Sci. China Inf. Sci. 59(5), 1–14 (2015)MathSciNetCrossRef
5.
Zurück zum Zitat Irshad, A., Ahmad, H.F., Alzahrani, B.A., Sher, M., Chaudhry, S.A.: An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans. Internet Inf. Syst. (TIIS) 10(12), 5572–5595 (2016) Irshad, A., Ahmad, H.F., Alzahrani, B.A., Sher, M., Chaudhry, S.A.: An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans. Internet Inf. Syst. (TIIS) 10(12), 5572–5595 (2016)
8.
Zurück zum Zitat Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., Yang, Y.: An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76, 37–48 (2016)CrossRef Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., Yang, Y.: An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76, 37–48 (2016)CrossRef
9.
Zurück zum Zitat Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)CrossRef Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)CrossRef
10.
Zurück zum Zitat Kocarev, L., Lian, S.: Chaos-Based Cryptography: Theory, Algorithms and Applications, vol. 354. Springer (2011) Kocarev, L., Lian, S.: Chaos-Based Cryptography: Theory, Algorithms and Applications, vol. 354. Springer (2011)
11.
Zurück zum Zitat Lee, C.C., Lin, T.H., Chang, R.X.: A secure dynamic id based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl. 38(11), 13863–13870 (2011) Lee, C.C., Lin, T.H., Chang, R.X.: A secure dynamic id based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl. 38(11), 13863–13870 (2011)
12.
Zurück zum Zitat Li, X., Xiong, Y., Ma, J., Wang, W.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763–769 (2012)CrossRef Li, X., Xiong, Y., Ma, J., Wang, W.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763–769 (2012)CrossRef
13.
Zurück zum Zitat Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1), 85–95 (2013)CrossRef Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1), 85–95 (2013)CrossRef
14.
Zurück zum Zitat Mangard, S., Oswald, E., Standaert, F.X.: One for allcall for one: unifying standard differential power analysis attacks. IET Inf. Secur. 5(2), 100–110 (2011)CrossRef Mangard, S., Oswald, E., Standaert, F.X.: One for allcall for one: unifying standard differential power analysis attacks. IET Inf. Secur. 5(2), 100–110 (2011)CrossRef
15.
Zurück zum Zitat Shunmuganathan, S., Saravanan, R.D., Palanichamy, Y.: Secure and efficient smart-card-based remote user authentication scheme for multiserver environment. Canad. J. Electr. Comput. Eng. 38(1), 20–30 (2015)CrossRef Shunmuganathan, S., Saravanan, R.D., Palanichamy, Y.: Secure and efficient smart-card-based remote user authentication scheme for multiserver environment. Canad. J. Electr. Comput. Eng. 38(1), 20–30 (2015)CrossRef
16.
Zurück zum Zitat Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3), 115–121 (2008)CrossRef Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3), 115–121 (2008)CrossRef
17.
Zurück zum Zitat Wang, D., Wang, P.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73, 41–57 (2014)CrossRef Wang, D., Wang, P.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73, 41–57 (2014)CrossRef
19.
Zurück zum Zitat Wu, F., Xu, L., Kumari, S., Li, X., Das, A.K., Khan, M.K., Karuppiah, M., Baliyan, R.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9, 3527–3542 (2016)CrossRef Wu, F., Xu, L., Kumari, S., Li, X., Das, A.K., Khan, M.K., Karuppiah, M., Baliyan, R.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9, 3527–3542 (2016)CrossRef
20.
Zurück zum Zitat Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J. Ambient Intell. Human. Comput. 8, 101–116 (2017)CrossRef Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J. Ambient Intell. Human. Comput. 8, 101–116 (2017)CrossRef
21.
Zurück zum Zitat Xu, L., Wu, F.: An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur. Commun. Netw. 8(2), 245–260 (2015)CrossRef Xu, L., Wu, F.: An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur. Commun. Netw. 8(2), 245–260 (2015)CrossRef
22.
Zurück zum Zitat Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008)MathSciNetCrossRef Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008)MathSciNetCrossRef
23.
Zurück zum Zitat Zhu, H.: Flexible and password-authenticated key agreement scheme based on chaotic maps for multiple servers to server architecture. Wirel. Pers. Commun. 82(3), 1697–1718 (2015)CrossRef Zhu, H.: Flexible and password-authenticated key agreement scheme based on chaotic maps for multiple servers to server architecture. Wirel. Pers. Commun. 82(3), 1697–1718 (2015)CrossRef
Metadaten
Titel
A New Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Multi-server Environment
verfasst von
Fan Wu
Lili Xu
Xiong Li
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7398-4_35

Premium Partner