A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices

被引:0
|
作者
Yoon, Eun-Jim [2 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, 1370 Sankyuk Dong, Taegu 702701, South Korea
[2] Daegu Polytech Coll, Fac Comp Informat, Taegu 706711, South Korea
关键词
Chaotic hash; Biometric authentication; Cryptanalysis; Mobile devices;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional remote user authentication methods mainly employ the possession of a token (magnetic cards, cell phones, personal digital assistant (PDA), and notebook computers, etc.) and/or the knowledge of a secret (password, etc.) in order to establish the identity of an individual. In 2006, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. The current paper, however, demonstrates that Khan et al.'s scheme is vulnerable to a privileged insider's attacks and impersonation attacks by using lost or stolen mobile devices. Also, we present an improvement to their scheme in order to isolate such problems.
引用
收藏
页码:612 / +
页数:3
相关论文
共 50 条
  • [1] Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    Khan, Muhammad Khurram
    Zhang, Jiashu
    Wang, Xiaomin
    [J]. CHAOS SOLITONS & FRACTALS, 2008, 35 (03) : 519 - 524
  • [2] A NEW FINGERPRINT BIOMETRIC REMOTE USER AUTHENTICATION SCHEME USING CHAOTIC HASH FUNCTION ON MOBILE DEVICES
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2010, 16 (03): : 471 - 487
  • [3] DePass: A Secure Hash-based Authentication Scheme
    Benzekki, Kamal
    El Fergougui, Abdeslam
    ElAlaoui, Abdelbaki ElBelrhiti
    [J]. 2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
  • [4] A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
    Kim, Minho
    Koc, Cetin Kaya
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 157 - 160
  • [5] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Cheng-Chi Lee
    Che-Wei Hsu
    [J]. Nonlinear Dynamics, 2013, 71 : 201 - 211
  • [6] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Lee, Cheng-Chi
    Hsu, Che-Wei
    [J]. NONLINEAR DYNAMICS, 2013, 71 (1-2) : 201 - 211
  • [7] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [8] Biometric Hash Generation and User Authentication based on Handwriting using Secure Sketches
    Scheidat, Tobias
    Vielhauer, Claus
    Dittmann, Jana
    [J]. 2009 PROCEEDINGS OF 6TH INTERNATIONAL SYMPOSIUM ON IMAGE AND SIGNAL PROCESSING AND ANALYSIS (ISPA 2009), 2009, : 550 - 555
  • [9] An efficient and secure biometric remote user authentication scheme using smart cards
    Wang, Xiaomin
    Zhang, Wenfang
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1864 - +
  • [10] A secure user authentication scheme using hash functions
    Yoon, Eun-Jun
    Ryu, Eun-Kyung
    Yoo, Kee-Young
    [J]. Operating Systems Review (ACM), 2004, 38 (02): : 62 - 68