Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme

被引:9
|
作者
Ryu, Jihyeon [1 ]
Kang, Dongwoo [2 ]
Won, Dongho [2 ]
机构
[1] Sungkyunkwan Univ, Dept Software, Suwon 16419, Gyeonggi Do, South Korea
[2] Sungkyunkwan Univ, Dept Elect & Comp Engn, Suwon 16419, Gyeonggi Do, South Korea
关键词
Chebyshev approximation; Authentication; Protocols; Servers; Resistance; Cryptography; Encryption; Authentication Chebyshev chaotic map; KEY AGREEMENT PROTOCOL; PASSWORD AUTHENTICATION;
D O I
10.1109/ACCESS.2022.3149315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Chebyshev chaotic map is a method for implementing efficient authentication. Recently, Chatterjee et al. proposed an authentication scheme for multi-server/multi-client environments using a Chebyshev chaotic map. However, we found four critical vulnerabilities in the proposed authentication method. To begin with, the method is open to user as well as server impersonation attacks. User revocation is also infeasible. Finally, there is a possibility of critical information leakage. We propose a new scheme that overcomes the four weaknesses listed previously using a symmetric Chebyshev chaotic map. We tested our proposed scheme using ProVerif and AVISPA, and compared its performance with that of the conventional authentication method. Results indicate that our scheme is 44.025 times more efficient than the conventional method.
引用
收藏
页码:15891 / 15910
页数:20
相关论文
共 50 条
  • [41] Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs
    Shawky, Mahmoud A.
    Usman, Muhammad
    Imran, Muhammad Ali
    Abbasi, Qammer H.
    Ansari, Shuja
    Taha, Ahmad
    [J]. VEHICULAR COMMUNICATIONS, 2023, 39
  • [42] An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
    Yoon, Eun-Jun
    Jeon, Il-Soo
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (06) : 2383 - 2389
  • [43] A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid
    Wang, Cong
    Li, Xiaohang
    Ma, Maode
    Zhang, Yiying
    [J]. 2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 288 - 293
  • [44] A Secure, Efficient and Lightweight User Authentication Scheme For Wireless LAN
    Kumar, Amit
    Om, Hari
    [J]. FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [45] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Kardas, Suleyman
    Genc, Ziya Alper
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 1135 - 1154
  • [46] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Süleyman Kardaş
    Ziya Alper Genç
    [J]. Wireless Personal Communications, 2018, 98 : 1135 - 1154
  • [47] PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks
    Xie, Qi
    Yao, Ye
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [48] Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie–Hellman assumption
    Tian-Fu Lee
    [J]. Nonlinear Dynamics, 2015, 81 : 2071 - 2078
  • [49] A novel chaotic map-based encryption scheme for surveillance videos
    Dhingra, Deepti
    Dua, Mohit
    [J]. PHYSICA SCRIPTA, 2023, 98 (12)
  • [50] Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing
    Benssalah, Mustapha
    Djeddou, Mustapha
    Drouiche, Karim
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5278 - 5294