Skip to main content
Erschienen in: Wireless Personal Communications 1/2018

21.11.2017

An Improve Three Factor Remote User Authentication Scheme Using Smart Card

verfasst von: Manish Shingala, Chintan Patel, Nishant Doshi

Erschienen in: Wireless Personal Communications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this digital era, two entities can exchange the messages over internet even through the physical distance between them is much far. Before exchange they require to authenticate each other via authentication scheme. Biometric is one of the unique feature for each entity and can be accustomed to identify the authenticity of the entity. Motivated by this, many researchers had proposed the various schemes based on biometric feature for authentication using smart card. As smart card is not a temper resistance consummately, various attacks have been identified by the researchers in the biometric based authentication schemes. In this paper we review Wen et al.’s scheme and we find that Wen et al.’s scheme is vulnerable to insider attack, denial of service attack and user anonymity cannot achieve by them. Then we propose new remote user authentication algorithm where our algorithm is secure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat An, Y. (2012). Improved biometrics-based remote user authentication scheme with session key agreement. In FGIT-GDC/IESH/CGAG, pp. 307–315. An, Y. (2012). Improved biometrics-based remote user authentication scheme with session key agreement. In FGIT-GDC/IESH/CGAG, pp. 307–315.
2.
Zurück zum Zitat An, Y. (2012). Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. BioMed Research International, 2012, 1–6. An, Y. (2012). Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. BioMed Research International, 2012, 1–6.
3.
Zurück zum Zitat Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(12), 1–12.CrossRef Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(12), 1–12.CrossRef
4.
Zurück zum Zitat Chaturvedi, A., Mishra, D., & Mukhopadhyay, S. (2013). Improved biometric-based three-factor remote user authentication scheme with key agreement using smart card. In: Information systems security, Springer, pp. 63–77. Chaturvedi, A., Mishra, D., & Mukhopadhyay, S. (2013). Improved biometric-based three-factor remote user authentication scheme with key agreement using smart card. In: Information systems security, Springer, pp. 63–77.
5.
Zurück zum Zitat Das, A. K. (2011). Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security, 5(3), 145–151.CrossRef Das, A. K. (2011). Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security, 5(3), 145–151.CrossRef
6.
Zurück zum Zitat Das, A. K. (2011). Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards. arXiv preprint arXiv:1103.3159. Das, A. K. (2011). Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards. arXiv preprint arXiv:​1103.​3159.
7.
Zurück zum Zitat Hwang, M. S., & Li, L. H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.CrossRef Hwang, M. S., & Li, L. H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.CrossRef
8.
Zurück zum Zitat Jin, A. T. B., Ling, D. N. C., & Goh, A. (2004). Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11), 2245–2255.CrossRef Jin, A. T. B., Ling, D. N. C., & Goh, A. (2004). Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11), 2245–2255.CrossRef
9.
Zurück zum Zitat Khan, M. K., & Kumari, S. (2013). An improved biometrics-based remote user authentication scheme with user anonymity. BioMed Research International, 2013, 1–9. Khan, M. K., & Kumari, S. (2013). An improved biometrics-based remote user authentication scheme with user anonymity. BioMed Research International, 2013, 1–9.
10.
Zurück zum Zitat Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef
11.
Zurück zum Zitat Lee, C. C., Chang, R. X., & Chen, L. A. (2011). Improvement of Li-Hwang’s biometrics-based remote user authentication scheme using smart cards. WTOC, 10(7), 193–200. Lee, C. C., Chang, R. X., & Chen, L. A. (2011). Improvement of Li-Hwang’s biometrics-based remote user authentication scheme using smart cards. WTOC, 10(7), 193–200.
12.
Zurück zum Zitat Lee, J., Ryu, S., & Yoo, K. (2002). Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters, 38(12), 1. Lee, J., Ryu, S., & Yoo, K. (2002). Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters, 38(12), 1.
13.
Zurück zum Zitat Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5.CrossRef Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5.CrossRef
14.
Zurück zum Zitat Li, X., Niu, J., Wang, Z., & Chen, C. (2014). Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks, 7(10), 1488–1497. Li, X., Niu, J., Wang, Z., & Chen, C. (2014). Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks, 7(10), 1488–1497.
15.
Zurück zum Zitat Li, X., Niu, J. W., Ma, J., Wang, W. D., & Liu, C. L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.CrossRef Li, X., Niu, J. W., Ma, J., Wang, W. D., & Liu, C. L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.CrossRef
16.
Zurück zum Zitat Lin, C. H., & Lai, Y. Y. (2004). A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 27(1), 19–23.CrossRef Lin, C. H., & Lai, Y. Y. (2004). A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 27(1), 19–23.CrossRef
17.
Zurück zum Zitat Nanavati, S., Thieme, M., & Nanavati, R. (2002). Biometrics, identity verification in a networked world. New York: Wiley. Nanavati, S., Thieme, M., & Nanavati, R. (2002). Biometrics, identity verification in a networked world. New York: Wiley.
18.
Zurück zum Zitat Ratha, N. K., Karu, K., Chen, S., & Jain, A. K. (1996). A real-time matching system for large fingerprint databases. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(8), 799–813.CrossRef Ratha, N. K., Karu, K., Chen, S., & Jain, A. K. (1996). A real-time matching system for large fingerprint databases. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(8), 799–813.CrossRef
19.
Zurück zum Zitat Sarvabhatla, M., & Vorugunti, C. S. (2014). A secure biometric-based user authentication scheme for heterogeneous WSN. In 2014 Fourth international conference of emerging applications of information technology (EAIT), IEEE, pp. 367–372. Sarvabhatla, M., & Vorugunti, C. S. (2014). A secure biometric-based user authentication scheme for heterogeneous WSN. In 2014 Fourth international conference of emerging applications of information technology (EAIT), IEEE, pp. 367–372.
20.
Zurück zum Zitat Shingala, M., Patel, C., & Doshi, N. (2015). An improved three factor remote user authentication scheme using smart card. A review. Berlin: Green Publisher. Shingala, M., Patel, C., & Doshi, N. (2015). An improved three factor remote user authentication scheme using smart card. A review. Berlin: Green Publisher.
21.
Zurück zum Zitat Truong, T. T., Tran, M. T., & Duong, A. D. (2013). Improved id-based remote user authentication scheme using smart card. In 2013 9th international wireless communications and mobile computing conference (IWCMC), IEEE, pp. 1672–1677. Truong, T. T., Tran, M. T., & Duong, A. D. (2013). Improved id-based remote user authentication scheme using smart card. In 2013 9th international wireless communications and mobile computing conference (IWCMC), IEEE, pp. 1672–1677.
22.
Zurück zum Zitat Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747–1760.CrossRef Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747–1760.CrossRef
23.
Zurück zum Zitat Wu, T. C. (1995). Remote login authentication scheme based on a geometric approach. Computer Communications, 18(12), 959–963.CrossRef Wu, T. C. (1995). Remote login authentication scheme based on a geometric approach. Computer Communications, 18(12), 959–963.CrossRef
Metadaten
Titel
An Improve Three Factor Remote User Authentication Scheme Using Smart Card
verfasst von
Manish Shingala
Chintan Patel
Nishant Doshi
Publikationsdatum
21.11.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5055-9

Weitere Artikel der Ausgabe 1/2018

Wireless Personal Communications 1/2018 Zur Ausgabe