Skip to main content
Log in

New biometrics-based authentication scheme for multi-server environment in critical systems

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The critical system is an open control system using distributed computing method and possessing increasing levels of autonomy. Due to openness of the network, the system is vulnerable various attacks. To enhance its security, the mutual authentication among the server, the user and the registration is essential. In last several years, many biometrics-based authentication schemes for critical systems based on the client-server environment were proposed for practical applications. However, those schemes are not suitable for critical systems based on the multi-server environment. To guarantee secure communication in critical systems based on the multi-server environment, we propose a new biometrics-based authentication scheme for the multi-server environment. Security analysis and performance analysis show that the proposed scheme avoids security weaknesses in previous schemes while additional cost is small.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Babak A, Esmael SP, Mohammad Hussein S (2014) Axiomatic agent based architecture for agile decision making in strategic information systems. J Ambient Intell Humaniz Comput 5:93–104

    Article  Google Scholar 

  • Cao X, Zhong S (2006) Breaking a remote user authentication scheme for multi-server architecture. IEEE Commun Lett 10:580–581

    Article  Google Scholar 

  • Catuogno L, Galdi C (2014) On user authentication by means of video events recognition. J Ambient Intell Humaniz Comput 5:909–918

    Article  Google Scholar 

  • Choi K, Toh K, Uh Y, Byun B (2012) Service-oriented architecture based on biometric using random features and incremental neural networks. Soft Comput 16:1539–1553

    Article  Google Scholar 

  • Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15:929–936

    Google Scholar 

  • He D, Chen J, Hu J (2012) Improvement on a smart card based password authentication scheme. J Internet Technol 13:405–410

    Google Scholar 

  • He D, Wang D, Wu S (2013) Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Inf Technol Control 42:170–177

    Google Scholar 

  • He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Pers Commun 74:229–243

    Article  Google Scholar 

  • He D, Huang Y (2012) Weaknesses in a dynamic id-based remote user authentication scheme for multi-server environment. Int J Electron Secur Digit Forensics 4:43–53

    Article  Google Scholar 

  • Hiroaki K, Kei N, Wakaha O, Masakatsu N (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14:529–536

    Article  Google Scholar 

  • Hsiang C, Shih WK (2009) Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Comput Stand Interfaces 31:1118–1123

    Article  Google Scholar 

  • Juang WS (2004) Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans Consum Electron 50:251–254

    Article  Google Scholar 

  • Ku WC, Chuang HM, Chiang MH, Chang KT (2005) Weaknesses of a multi-server password authenticated key agreement schemes. Proceedings of 2005 National Calculater Symposium, pp 1–5

  • Lee CC, Lin TH, Chang RX (2011) A secure dynamic id based remote user authentication scheme for multi-server environment using smart cards. Expert Syst Appl 38(11):13863–13870

    Google Scholar 

  • Li J, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mobile Networks Appl 16:553–561

    Article  Google Scholar 

  • Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25:2201–2210

    Article  Google Scholar 

  • Liao YP, Wang SS (2009) A secure dynamic id based remote user authentication scheme for multi-server environment. Comput Stand Interfaces 31:24–29

    Article  Google Scholar 

  • Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180:1681–1689

    Article  MATH  MathSciNet  Google Scholar 

  • Massimo T, Ben S (2011) Biometrics in ambient intelligence. J Ambient Intell Humaniz Comput 2:113–126

    Article  Google Scholar 

  • Yoon EJ, Yoo KY (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63:235–255

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the Guangzhou Zhujiang Science and Technology Future Fellow Fund under Grant No. 2012J2200094, the Guangdong Province Distinguished Young Scholars Fund of Department of Education under Grant No. Yq2013126, the Natural Science Foundation of Hubei Province of China under Grant No. 2015CFB257 and the National Natural Science Foundation of China (NSFC) under Grants Nos. 61370224 and 61472074.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han Shen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, H., Gao, C., He, D. et al. New biometrics-based authentication scheme for multi-server environment in critical systems. J Ambient Intell Human Comput 6, 825–834 (2015). https://doi.org/10.1007/s12652-015-0305-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-015-0305-8

Keywords

Navigation