Skip to main content
Erschienen in: Wireless Networks 2/2020

08.09.2018

Authentication scheme based on smart card in multi-server environment

verfasst von: Simin Zhou, Qingqing Gan, Xiaoming Wang

Erschienen in: Wireless Networks | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

For authentication schemes based on smart card in multi-server environment, there is a common problem—the parameters stored in a user’s smart card linearly increase with the number of the registered servers without involving registration center in helping with authentication process. Therefore, in order to save storage cost and raise efficiency, an authentication scheme based on smart card is proposed in multi-server environment. In the proposed scheme, a user only needs one time registration, and keeps a password to realize the authentication with different servers without involving the registration center in helping with authentication process. The server is unnecessary to store any users information to achieve authentication between the users and the server. Moreover, the security of the proposed scheme is proved by Burrows–Abadi–Needham logic. The security analysis and the performance analysis show the proposed scheme is secured against various well known attacks, and has lower communication cost, computation cost and storage cost compared with several related schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), 816–823.CrossRef He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), 816–823.CrossRef
2.
Zurück zum Zitat Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953–1966.CrossRef Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953–1966.CrossRef
3.
Zurück zum Zitat Shen, H., Gao, C. Z., He, D. D., & Wu, L. B. (2015). New biometrics-based authentication scheme for multi-server environment in critical systems. Journal of Ambient Intelligence and Humanized Computing, 6(6), 825–834.CrossRef Shen, H., Gao, C. Z., He, D. D., & Wu, L. B. (2015). New biometrics-based authentication scheme for multi-server environment in critical systems. Journal of Ambient Intelligence and Humanized Computing, 6(6), 825–834.CrossRef
4.
Zurück zum Zitat Li, X., Wang, K., & Shen, J. (2016). An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. Journal of Ambient Intelligence and Humanized Computing, 7(3), 427–443.CrossRef Li, X., Wang, K., & Shen, J. (2016). An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. Journal of Ambient Intelligence and Humanized Computing, 7(3), 427–443.CrossRef
5.
Zurück zum Zitat Chang, C. C., Hsueh, W. Y., & Cheng, T. F. (2016). An advanced anonymous and biometrics-based multi-server authentication scheme using smart cards. International Journal of Network Security, 18(6), 1010–1021. Chang, C. C., Hsueh, W. Y., & Cheng, T. F. (2016). An advanced anonymous and biometrics-based multi-server authentication scheme using smart cards. International Journal of Network Security, 18(6), 1010–1021.
6.
Zurück zum Zitat Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., & Shen, J. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 68, 320–330.CrossRef Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., & Shen, J. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 68, 320–330.CrossRef
7.
Zurück zum Zitat Quan, C., Lee, H., Kang, D., Kim, J., Cho, S., & Won, D. (2017). Cryptanalysis and improvement of an advanced anonymous and biometrics-based multi-server authentication scheme using smart cards. In Proceeding of international conference on applied human factors and ergonomics (pp. 62–71). Quan, C., Lee, H., Kang, D., Kim, J., Cho, S., & Won, D. (2017). Cryptanalysis and improvement of an advanced anonymous and biometrics-based multi-server authentication scheme using smart cards. In Proceeding of international conference on applied human factors and ergonomics (pp. 62–71).
8.
Zurück zum Zitat Feng, Q., He, D., Zeadally, S., & Wang, H. (2018). An anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Generation Computer Systems, 84, 239–251.CrossRef Feng, Q., He, D., Zeadally, S., & Wang, H. (2018). An anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Generation Computer Systems, 84, 239–251.CrossRef
9.
Zurück zum Zitat Wang, B., & Ma, M. (2013). A smart card based efficient and secured multi-server authentication scheme. Wireless Personal Communications, 68(2), 361–378.CrossRef Wang, B., & Ma, M. (2013). A smart card based efficient and secured multi-server authentication scheme. Wireless Personal Communications, 68(2), 361–378.CrossRef
10.
Zurück zum Zitat Pippal, R. S., Jaidhar, C. D., & Tapaswi, S. (2013). Robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 72(1), 729–745.CrossRef Pippal, R. S., Jaidhar, C. D., & Tapaswi, S. (2013). Robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 72(1), 729–745.CrossRef
11.
Zurück zum Zitat Guo, D., & Wen, F. (2014). Analysis and improvement of a robust smart card based-authentication scheme for multi-server architecture. Wireless Personal Communications, 78(1), 475–490.CrossRef Guo, D., & Wen, F. (2014). Analysis and improvement of a robust smart card based-authentication scheme for multi-server architecture. Wireless Personal Communications, 78(1), 475–490.CrossRef
12.
Zurück zum Zitat Chuang, M. C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.CrossRef Chuang, M. C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.CrossRef
13.
Zurück zum Zitat Lin, H., Wen, F., & Du, C. (2015). An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wireless Personal Communications, 84(4), 2351–2362.CrossRef Lin, H., Wen, F., & Du, C. (2015). An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wireless Personal Communications, 84(4), 2351–2362.CrossRef
14.
Zurück zum Zitat Wan, T., Liu, Z. X., & Ma, J. F. (2016). Authentication and key agreement protocol for multi-server. Architecture, 53(11), 2446–2453. Wan, T., Liu, Z. X., & Ma, J. F. (2016). Authentication and key agreement protocol for multi-server. Architecture, 53(11), 2446–2453.
15.
Zurück zum Zitat Nimmy, K. (2016). Novel multi-server authentication protocol using secret sharing. In Proceeding of international conference on data mining and advanced computing (SAPIENCE) (pp. 214–219). Nimmy, K. (2016). Novel multi-server authentication protocol using secret sharing. In Proceeding of international conference on data mining and advanced computing (SAPIENCE) (pp. 214–219).
16.
Zurück zum Zitat Reddy, A. G., Das, A. K., & Odelu, V. (2016). An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryp tography. PLoS ONE, 11(5), e0154308.CrossRef Reddy, A. G., Das, A. K., & Odelu, V. (2016). An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryp tography. PLoS ONE, 11(5), e0154308.CrossRef
17.
Zurück zum Zitat Sarvabhatla, M., Reddy, M. C. M., Narayana, K. L., et al. (2016). A robust user anonymity preserving biometric based multi-server authenticated key agreement scheme. In M. Senthilkumar, V. Ramasamy, S. Sheen, C. Veeramani, A. Bonato, L. Batten (Eds.), Computational intelligence, cyber security and computational models. Advances in intelligent systems and computing, vol 412 (pp. 325–333). Singapore: Springer. Sarvabhatla, M., Reddy, M. C. M., Narayana, K. L., et al. (2016). A robust user anonymity preserving biometric based multi-server authenticated key agreement scheme. In M. Senthilkumar, V. Ramasamy, S. Sheen, C. Veeramani, A. Bonato, L. Batten (Eds.), Computational intelligence, cyber security and computational models. Advances in intelligent systems and computing, vol 412 (pp. 325–333). Singapore: Springer.
18.
Zurück zum Zitat Chaturvedi, A., Das, A. K., & Mishra, D. (2016). Design of a secure smart card-based multi-server authentication scheme. Journal of Information Security and Applications, 30, 64–80.CrossRef Chaturvedi, A., Das, A. K., & Mishra, D. (2016). Design of a secure smart card-based multi-server authentication scheme. Journal of Information Security and Applications, 30, 64–80.CrossRef
19.
Zurück zum Zitat Gu, Y., & Li, S. (2018). Cryptanalysis and improvement of a biometrics-based multi-server authentication protocol. In Proceeding of international conference on computing, networking and communications (pp. 16–20). Gu, Y., & Li, S. (2018). Cryptanalysis and improvement of a biometrics-based multi-server authentication protocol. In Proceeding of international conference on computing, networking and communications (pp. 16–20).
20.
Zurück zum Zitat Wang, M., & Wang, X. M. (2016). Multi-server anonymous authentication scheme based on smart card. Computer Engineering, 42(5), 156–162. Wang, M., & Wang, X. M. (2016). Multi-server anonymous authentication scheme based on smart card. Computer Engineering, 42(5), 156–162.
21.
Zurück zum Zitat Wang, C., Xu, G., & Li, W. (2018). A secure and anonymous two-factor authentication protocol in multiserver environment. Security and Communication Networks, 2018(1), 1–15.CrossRef Wang, C., Xu, G., & Li, W. (2018). A secure and anonymous two-factor authentication protocol in multiserver environment. Security and Communication Networks, 2018(1), 1–15.CrossRef
22.
Zurück zum Zitat Chaturvedi, A., Mishra, D., Jangirala, S., & Mukhopadhyay, S. (2017). A privacy preserving biometric-based three factor remote user authenticated key agreement scheme. Journal of Information Security and Applications, 32, 15–26.CrossRef Chaturvedi, A., Mishra, D., Jangirala, S., & Mukhopadhyay, S. (2017). A privacy preserving biometric-based three factor remote user authenticated key agreement scheme. Journal of Information Security and Applications, 32, 15–26.CrossRef
23.
Zurück zum Zitat Bae, W. I., & Kwak, J. (2017). Smart card-based secure authentication protocol in multi-server IoT environment. Multimedia Tools and Applications, 2017, 1–19. Bae, W. I., & Kwak, J. (2017). Smart card-based secure authentication protocol in multi-server IoT environment. Multimedia Tools and Applications, 2017, 1–19.
24.
Zurück zum Zitat Amin, R., Islam, S. K., Obaidat, M. S., Biswas, G. P., & Hsiao, K. F. (2017). An anonymous and robust multi-server authentication protocol using multiple registration servers. International Journal of Communication Systems, 30(18), 1–14.CrossRef Amin, R., Islam, S. K., Obaidat, M. S., Biswas, G. P., & Hsiao, K. F. (2017). An anonymous and robust multi-server authentication protocol using multiple registration servers. International Journal of Communication Systems, 30(18), 1–14.CrossRef
25.
Zurück zum Zitat Kumar, A., & Om, H. (2018). An improved and secure multi-server authentication scheme based on biometrics and smartcard. Digital Communications and Networks, 4(1), 27–38.CrossRef Kumar, A., & Om, H. (2018). An improved and secure multi-server authentication scheme based on biometrics and smartcard. Digital Communications and Networks, 4(1), 27–38.CrossRef
26.
Zurück zum Zitat Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRef Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRef
27.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences. The Royal Society, 426(1871), 233–271.MathSciNetCrossRef Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences. The Royal Society, 426(1871), 233–271.MathSciNetCrossRef
Metadaten
Titel
Authentication scheme based on smart card in multi-server environment
verfasst von
Simin Zhou
Qingqing Gan
Xiaoming Wang
Publikationsdatum
08.09.2018
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-1828-7

Weitere Artikel der Ausgabe 2/2020

Wireless Networks 2/2020 Zur Ausgabe

Neuer Inhalt