Skip to main content
Top
Published in: Wireless Personal Communications 2/2022

29-06-2022

Biometric-based Remote Mutual Authentication Scheme for Mobile Device

Authors: Sheng-Kai Chen, Jenq-Shiou Leu, Wen-Bin Hsieh, Jui-Tang Wang, Tian Song

Published in: Wireless Personal Communications | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Remote user authentication schemes provide a system to verify the legitimacy of remote users’ authentication request over insecure communication channel. In the past years, many authentication schemes using password and smart card have been proposed. However, password might be guessed, leaked or forgotten and smart card might be shared, lost or stolen. In contrast, the biometrics which utilize biological characteristics, such as face, fingerprint or iris, have no such weakness. With the trend of mobile payment, more and more applications of mobile payment use biometrics to replace password and smart card. In this paper, we propose a biometric-based remote authentication scheme substituting biometric and mobile device bounded by user for password and smart card. This scheme is more convenient, suitable and securer than the schemes using smart cards on mobile payment environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.CrossRef Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.CrossRef
2.
go back to reference Haller, Neil. “The S/KEY one-time password system,” IETF RFC 1760, 1995. Haller, Neil. “The S/KEY one-time password system,” IETF RFC 1760, 1995.
3.
go back to reference Gwoboa, H. (1995). Password authentication without using a password table. Information Processing Letters, 55(5), 247–250.CrossRef Gwoboa, H. (1995). Password authentication without using a password table. Information Processing Letters, 55(5), 247–250.CrossRef
4.
go back to reference Hwang, M.-S., & Li, L.-H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.CrossRef Hwang, M.-S., & Li, L.-H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.CrossRef
5.
go back to reference Li, Chun-Ta, Lee, Cheng-Chi, Liu, Chen-Ju, amd Lee, Chin-Wen. “A robust remote user authentication scheme against smart card security breach,” 3th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231–238. Li, Chun-Ta, Lee, Cheng-Chi, Liu, Chen-Ju, amd Lee, Chin-Wen. “A robust remote user authentication scheme against smart card security breach,” 3th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231–238.
6.
go back to reference Kumari, Saru, and Muhammad Khurram Khan. “Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’,” International Journal of Communication Systems 27.12, pp. 3939–3955, 2014. Kumari, Saru, and Muhammad Khurram Khan. “Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’,” International Journal of Communication Systems 27.12, pp. 3939–3955, 2014.
7.
go back to reference Li, C.-T., & Hwang, M.-S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and computer applications, 33(1), 1–5.CrossRef Li, C.-T., & Hwang, M.-S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and computer applications, 33(1), 1–5.CrossRef
8.
go back to reference Das, Amal K. “Analysis and improvement on an efficient biometric based remote user authentication scheme using smart cards,” Information Security, IET 5.3, pp. 145–151, 2011. Das, Amal K. “Analysis and improvement on an efficient biometric based remote user authentication scheme using smart cards,” Information Security, IET 5.3, pp. 145–151, 2011.
9.
go back to reference An, Younghwa. “Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards,” BioMed Research International, vol. 2012, Article ID 519723, 6 pages, 2012. An, Younghwa. “Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards,” BioMed Research International, vol. 2012, Article ID 519723, 6 pages, 2012.
10.
go back to reference Khan, Muhammad Khurram, and Saru Kumari. “An improved biometricsbased remote user authentication scheme with user anonymity,” BioMed Research International, vol. 2013, Article ID 491289, 9 pages, 2013. Khan, Muhammad Khurram, and Saru Kumari. “An improved biometricsbased remote user authentication scheme with user anonymity,” BioMed Research International, vol. 2013, Article ID 491289, 9 pages, 2013.
11.
go back to reference Mishra, Dheerendra, Ashok Kumar Das, and Sourav Mukhopadhyay. “A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards,” Expert Systems with Applications 41.18, pp. 8129–8143, 2014. Mishra, Dheerendra, Ashok Kumar Das, and Sourav Mukhopadhyay. “A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards,” Expert Systems with Applications 41.18, pp. 8129–8143, 2014.
12.
go back to reference He, Debiao, and Ding Wang. “Robust biometrics-based authentication scheme for multiserver environment,” Systems Journal, IEEE 9.3, pp.816823, 2015. He, Debiao, and Ding Wang. “Robust biometrics-based authentication scheme for multiserver environment,” Systems Journal, IEEE 9.3, pp.816823, 2015.
13.
go back to reference Standard, NIST-FIPS. “Announcing the advanced encryption standard (AES),” Federal Information Processing Standards Publication 197 (2001), pp. 1–51, 2001. Standard, NIST-FIPS. “Announcing the advanced encryption standard (AES),” Federal Information Processing Standards Publication 197 (2001), pp. 1–51, 2001.
14.
go back to reference Daemen, Joan, and Vincent Rijmen. “AES proposal: Rijndael,” 1999. Daemen, Joan, and Vincent Rijmen. “AES proposal: Rijndael,” 1999.
16.
go back to reference J. C. Klontz, B. F. Klare, S. Klum, A. K. Jain and M. J. Burge, "Open source biometric recognition," 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013 J. C. Klontz, B. F. Klare, S. Klum, A. K. Jain and M. J. Burge, "Open source biometric recognition," 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013
17.
go back to reference Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29, 198–208.MathSciNetCrossRef Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29, 198–208.MathSciNetCrossRef
18.
go back to reference Das, A. K., & Goswami, A. (2015). A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci, 27(2), 193–210. Das, A. K., & Goswami, A. (2015). A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci, 27(2), 193–210.
20.
go back to reference Rachmat, Nur & Samsuryadi, Samsuryadi. (2019). Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone. Journal of Physics: Conference Series. Rachmat, Nur & Samsuryadi, Samsuryadi. (2019). Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone. Journal of Physics: Conference Series.
Metadata
Title
Biometric-based Remote Mutual Authentication Scheme for Mobile Device
Authors
Sheng-Kai Chen
Jenq-Shiou Leu
Wen-Bin Hsieh
Jui-Tang Wang
Tian Song
Publication date
29-06-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09814-8

Other articles of this Issue 2/2022

Wireless Personal Communications 2/2022 Go to the issue