Skip to main content
Top
Published in: Wireless Personal Communications 3/2016

01-02-2016

A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications

Authors: Xuelei Li, Qiaoyan Wen, Wenmin Li

Published in: Wireless Personal Communications | Issue 3/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Anonymous remote user authentication plays more and more important role in wireless personal communication networks to guarantee systematic security and personal privacy. However, as promising as it is, security and privacy issues have seriously challenged user experience and system performance in the authentication schemes for a long time. In this paper, we propose a remote user authentication scheme for wireless communication networks. Our proposal employs the personal workstation as a trusted proxy to preserve perfect user privacy, while maintaining system security. It not only provides mutual authentication with key agreement mechanism, but also keeps user’ privacy private in a reliable domain. In addition, the technologies of Bluetooth (or Wifi) improve user experience and improve user friendliness in three-factor based authentication schemes. Moreover, our scheme supports flexible user login and security level. Finally, the security proof and performance analysis show that our scheme is more efficient and practical.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Awasthi, A. K., Srivastava, K., & Mittal, R. C. (2011). An improved timestamp-based remote user authentication scheme. Computers & Electrical Engineering, 37(6), 869–874.CrossRef Awasthi, A. K., Srivastava, K., & Mittal, R. C. (2011). An improved timestamp-based remote user authentication scheme. Computers & Electrical Engineering, 37(6), 869–874.CrossRef
2.
go back to reference Bonneau, J., Herley, C., & Van Oorschot, P. C., et al. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In IEEE symposium on security and privacy, pp. 553–567. Bonneau, J., Herley, C., & Van Oorschot, P. C., et al. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In IEEE symposium on security and privacy, pp. 553–567.
3.
go back to reference Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.CrossRefMATH Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.CrossRefMATH
4.
go back to reference Chien, H. Y., Jan, J. K., & Tseng, Y. M. (2002). An efficient and practical solution to remote authentication: Smart card. Computers & Security, 21(4), 372–375.CrossRef Chien, H. Y., Jan, J. K., & Tseng, Y. M. (2002). An efficient and practical solution to remote authentication: Smart card. Computers & Security, 21(4), 372–375.CrossRef
5.
go back to reference Czeskis, A., Dietz, M., & Kohno, T., et al. (2012). Strengthening user authentication through opportunistic cryptographic identity assertions. In Proceedings of the 2012 ACM conference on computer and communications security, pp. 404–414. Czeskis, A., Dietz, M., & Kohno, T., et al. (2012). Strengthening user authentication through opportunistic cryptographic identity assertions. In Proceedings of the 2012 ACM conference on computer and communications security, pp. 404–414.
6.
go back to reference Dietz, M., Czeskis, A., & Balfanz, D., et al. (2012). Origin-bound certificates: A fresh approach to strong client authentication for the web. In Proceedings of 21st USENIX security symposium. Dietz, M., Czeskis, A., & Balfanz, D., et al. (2012). Origin-bound certificates: A fresh approach to strong client authentication for the web. In Proceedings of 21st USENIX security symposium.
7.
go back to reference Dodis, Y., Ostrovsky, R., Reyzin, L., et al. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.MathSciNetCrossRefMATH Dodis, Y., Ostrovsky, R., Reyzin, L., et al. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.MathSciNetCrossRefMATH
8.
go back to reference Halevi, S., & Krawczyk, H. (1999). Public-key cryptography and password protocols. ACM Transactions on Information and System Security (TISSEC), 2(3), 230–268.CrossRef Halevi, S., & Krawczyk, H. (1999). Public-key cryptography and password protocols. ACM Transactions on Information and System Security (TISSEC), 2(3), 230–268.CrossRef
9.
go back to reference Hwang, M. S., & Li, L. H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.CrossRef Hwang, M. S., & Li, L. H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.CrossRef
10.
go back to reference Huang, X., Xiang, Y., Chonka, A., et al. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390–1397.CrossRef Huang, X., Xiang, Y., Chonka, A., et al. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390–1397.CrossRef
11.
go back to reference Jain, A. K., & Nandakumar, K. (2012). Biometric authentication: System security and user privacy. IEEE Computer, 45(11), 87–92.CrossRef Jain, A. K., & Nandakumar, K. (2012). Biometric authentication: System security and user privacy. IEEE Computer, 45(11), 87–92.CrossRef
12.
go back to reference Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in Cryptology CRYPTO’99, pp. 388–397. Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in Cryptology CRYPTO’99, pp. 388–397.
13.
go back to reference Li, X., Niu, J. W., Ma, J., et al. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.CrossRef Li, X., Niu, J. W., Ma, J., et al. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.CrossRef
14.
go back to reference Li, X., Xiong, Y., Ma, J., et al. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769.CrossRef Li, X., Xiong, Y., Ma, J., et al. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769.CrossRef
15.
go back to reference Li, X., Wen, Q., Zhang, H., et al. (2013). An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. International Journal of Network Management, 23(5), 311–324.CrossRef Li, X., Wen, Q., Zhang, H., et al. (2013). An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. International Journal of Network Management, 23(5), 311–324.CrossRef
16.
go back to reference Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.MathSciNetCrossRef Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.MathSciNetCrossRef
17.
go back to reference Samfat, D., Molva, R., & Asokan, N. (1995). Untraceability in mobile networks. In Proceedings of the 1st annual international conference on Mobile computing and networking, pp. 26–36. Samfat, D., Molva, R., & Asokan, N. (1995). Untraceability in mobile networks. In Proceedings of the 1st annual international conference on Mobile computing and networking, pp. 26–36.
19.
go back to reference Wen, F., & Li, X. (2012). An improved dynamic ID-based remote user authentication with key agreement scheme. Computers and Electrical Engineering, 38(2), 381–387.CrossRef Wen, F., & Li, X. (2012). An improved dynamic ID-based remote user authentication with key agreement scheme. Computers and Electrical Engineering, 38(2), 381–387.CrossRef
20.
go back to reference Yang, P., Cao, Z., & Dong, X. (2011). Fuzzy identity based signature with applications to biometric authentication. Computers and Electrical Engineering, 37(4), 532–540.MathSciNetCrossRefMATH Yang, P., Cao, Z., & Dong, X. (2011). Fuzzy identity based signature with applications to biometric authentication. Computers and Electrical Engineering, 37(4), 532–540.MathSciNetCrossRefMATH
Metadata
Title
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications
Authors
Xuelei Li
Qiaoyan Wen
Wenmin Li
Publication date
01-02-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2016
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3008-8

Other articles of this Issue 3/2016

Wireless Personal Communications 3/2016 Go to the issue