Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

29.06.2022

Biometric-based Remote Mutual Authentication Scheme for Mobile Device

verfasst von: Sheng-Kai Chen, Jenq-Shiou Leu, Wen-Bin Hsieh, Jui-Tang Wang, Tian Song

Erschienen in: Wireless Personal Communications

Einloggen, um Zugang zu erhalten
share
TEILEN

Abstract

Remote user authentication schemes provide a system to verify the legitimacy of remote users’ authentication request over insecure communication channel. In the past years, many authentication schemes using password and smart card have been proposed. However, password might be guessed, leaked or forgotten and smart card might be shared, lost or stolen. In contrast, the biometrics which utilize biological characteristics, such as face, fingerprint or iris, have no such weakness. With the trend of mobile payment, more and more applications of mobile payment use biometrics to replace password and smart card. In this paper, we propose a biometric-based remote authentication scheme substituting biometric and mobile device bounded by user for password and smart card. This scheme is more convenient, suitable and securer than the schemes using smart cards on mobile payment environment.
Literatur
1.
Zurück zum Zitat Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772. MathSciNetCrossRef Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772. MathSciNetCrossRef
2.
Zurück zum Zitat Haller, Neil. “The S/KEY one-time password system,” IETF RFC 1760, 1995. Haller, Neil. “The S/KEY one-time password system,” IETF RFC 1760, 1995.
3.
Zurück zum Zitat Gwoboa, H. (1995). Password authentication without using a password table. Information Processing Letters, 55(5), 247–250. CrossRef Gwoboa, H. (1995). Password authentication without using a password table. Information Processing Letters, 55(5), 247–250. CrossRef
4.
Zurück zum Zitat Hwang, M.-S., & Li, L.-H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30. CrossRef Hwang, M.-S., & Li, L.-H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30. CrossRef
5.
Zurück zum Zitat Li, Chun-Ta, Lee, Cheng-Chi, Liu, Chen-Ju, amd Lee, Chin-Wen. “A robust remote user authentication scheme against smart card security breach,” 3th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231–238. Li, Chun-Ta, Lee, Cheng-Chi, Liu, Chen-Ju, amd Lee, Chin-Wen. “A robust remote user authentication scheme against smart card security breach,” 3th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231–238.
6.
Zurück zum Zitat Kumari, Saru, and Muhammad Khurram Khan. “Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’,” International Journal of Communication Systems 27.12, pp. 3939–3955, 2014. Kumari, Saru, and Muhammad Khurram Khan. “Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’,” International Journal of Communication Systems 27.12, pp. 3939–3955, 2014.
7.
Zurück zum Zitat Li, C.-T., & Hwang, M.-S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and computer applications, 33(1), 1–5. CrossRef Li, C.-T., & Hwang, M.-S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and computer applications, 33(1), 1–5. CrossRef
8.
Zurück zum Zitat Das, Amal K. “Analysis and improvement on an efficient biometric based remote user authentication scheme using smart cards,” Information Security, IET 5.3, pp. 145–151, 2011. Das, Amal K. “Analysis and improvement on an efficient biometric based remote user authentication scheme using smart cards,” Information Security, IET 5.3, pp. 145–151, 2011.
9.
Zurück zum Zitat An, Younghwa. “Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards,” BioMed Research International, vol. 2012, Article ID 519723, 6 pages, 2012. An, Younghwa. “Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards,” BioMed Research International, vol. 2012, Article ID 519723, 6 pages, 2012.
10.
Zurück zum Zitat Khan, Muhammad Khurram, and Saru Kumari. “An improved biometricsbased remote user authentication scheme with user anonymity,” BioMed Research International, vol. 2013, Article ID 491289, 9 pages, 2013. Khan, Muhammad Khurram, and Saru Kumari. “An improved biometricsbased remote user authentication scheme with user anonymity,” BioMed Research International, vol. 2013, Article ID 491289, 9 pages, 2013.
11.
Zurück zum Zitat Mishra, Dheerendra, Ashok Kumar Das, and Sourav Mukhopadhyay. “A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards,” Expert Systems with Applications 41.18, pp. 8129–8143, 2014. Mishra, Dheerendra, Ashok Kumar Das, and Sourav Mukhopadhyay. “A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards,” Expert Systems with Applications 41.18, pp. 8129–8143, 2014.
12.
Zurück zum Zitat He, Debiao, and Ding Wang. “Robust biometrics-based authentication scheme for multiserver environment,” Systems Journal, IEEE 9.3, pp.816823, 2015. He, Debiao, and Ding Wang. “Robust biometrics-based authentication scheme for multiserver environment,” Systems Journal, IEEE 9.3, pp.816823, 2015.
13.
Zurück zum Zitat Standard, NIST-FIPS. “Announcing the advanced encryption standard (AES),” Federal Information Processing Standards Publication 197 (2001), pp. 1–51, 2001. Standard, NIST-FIPS. “Announcing the advanced encryption standard (AES),” Federal Information Processing Standards Publication 197 (2001), pp. 1–51, 2001.
14.
Zurück zum Zitat Daemen, Joan, and Vincent Rijmen. “AES proposal: Rijndael,” 1999. Daemen, Joan, and Vincent Rijmen. “AES proposal: Rijndael,” 1999.
16.
Zurück zum Zitat J. C. Klontz, B. F. Klare, S. Klum, A. K. Jain and M. J. Burge, "Open source biometric recognition," 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013 J. C. Klontz, B. F. Klare, S. Klum, A. K. Jain and M. J. Burge, "Open source biometric recognition," 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013
17.
Zurück zum Zitat Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29, 198–208. MathSciNetCrossRef Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29, 198–208. MathSciNetCrossRef
18.
Zurück zum Zitat Das, A. K., & Goswami, A. (2015). A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci, 27(2), 193–210. Das, A. K., & Goswami, A. (2015). A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci, 27(2), 193–210.
20.
Zurück zum Zitat Rachmat, Nur & Samsuryadi, Samsuryadi. (2019). Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone. Journal of Physics: Conference Series. Rachmat, Nur & Samsuryadi, Samsuryadi. (2019). Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone. Journal of Physics: Conference Series.
Metadaten
Titel
Biometric-based Remote Mutual Authentication Scheme for Mobile Device
verfasst von
Sheng-Kai Chen
Jenq-Shiou Leu
Wen-Bin Hsieh
Jui-Tang Wang
Tian Song
Publikationsdatum
29.06.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09814-8