A Multi-Factor Authentication Scheme Under the SM9 Algorithm Framework

被引:0
|
作者
Zhu, Liufu [1 ]
Wang, Ding [1 ]
机构
[1] ①(College of Ciber Science, Nankai University, Tianjin 300350, China) ②(Tianjin Key Laboratory of Network and Data Security, Nankai University, Tianjin 300350, China) ③(Key Laboratory of Data and Intelligent System Security, Nankai University, Tianjin 3003
基金
中国国家自然科学基金;
关键词
Authentication - Cryptography - Smart cards;
D O I
10.11999/JEIT231197
中图分类号
学科分类号
摘要
Wireless sensor networks use public wireless channels and their storage and computing resources are limited, making them vulnerable to active attacks and passive attacks. Identity authentication acts as the first line to ensure the security of information systems. Then, how to design multi-factor authentication schemes for wireless sensor devices is currently a hot topic. Nowadays, most existing schemes are based on foreign cryptographic standards that do not comply with the autonomous and controllable cyberspace security development strategy. SM9 is an identity-based cryptographic algorithm that has become a Chinese cryptographic standard recently. Therefore, this paper focuses on how to combine passwords, biometrics, and smart cards to design a multi-factor authentication scheme that can be used for wireless sensor networks under the framework of SM9. The proposed scheme applies the fuzzy verifier technique and the honeyword method to resist password guessing attacks and further enables session key negotiation and password update. The security is proved under the Random Oracle Model (ROM) and a heuristic security analysis is provided additionally. The comparison results show that the proposed scheme can be deployed to wireless sensor networks. © 2024 Science Press. All rights reserved.
引用
收藏
页码:2137 / 2148
相关论文
共 50 条
  • [1] A Systematic Review on Multi-Factor Authentication Framework
    Syahreen, Muhammad
    Hafizah, Noor
    Maarop, Nurazean
    Maslinan, Mayasarah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 1043 - 1050
  • [2] Biometric multi-factor authentication: On the usability of the FingerPIN scheme
    Marasco, Emanuela
    Albanese, Massimiliano
    Patibandla, Venkata Vamsi Ram
    Vurity, Anudeep
    Sriram, Sumanth Sai
    [J]. SECURITY AND PRIVACY, 2023, 6 (01)
  • [3] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836
  • [4] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [5] Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
    Tahir, Haseeb
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Ferzund, Javed
    Kumar, Neeraj
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14978 - 14986
  • [6] Multi-factor authentication scheme based on custom attributes
    Zhu, Dexin
    Zhou, Hu
    Li, Nianfeng
    Song, Lijun
    Zheng, Jun
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7741 - 7756
  • [7] A Multi-Factor Authentication Framework for Secure Access to Blockchain
    Sahan, Sercan
    Ekici, Adil Furkan
    Bahtiyar, Serif
    [J]. PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA 2019), 2019, : 160 - 164
  • [8] Framework for Multi-factor Authentication with Dynamically Generated Passwords
    Chenchev, Ivaylo
    [J]. ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 563 - 576
  • [9] A Modular Framework for Multi-Factor Authentication and Key Exchange
    Fleischhacker, Nils
    Manulis, Mark
    Azodi, Amir
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2014, 2014, 8893 : 190 - 214
  • [10] Revocation Encryption Scheme Based on SM9
    Lai, Jian-Chang
    Huang, Xin-Yi
    He, De-Biao
    Chen, Li-Quan
    Yang, Shao-Jun
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (12): : 5609 - 5620