Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks

被引:45
|
作者
ul Haq, Inam [1 ]
Wang, Jian [1 ]
Zhu, Youwen [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut NUAA, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
关键词
Multi-server architecture; Crypt-analysis; User impersonation attack; Self-certified public key; Light weight; AGREEMENT SCHEME; CHAOTIC MAP; EFFICIENT; ARCHITECTURE; ENVIRONMENT; BIOMETRICS; DESIGN;
D O I
10.1016/j.jnca.2020.102660
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently Ying and Nayak proposed a multi-server supported lightweight authentication protocol for 5G networks and confirmed the security of their protocol against all prominent attacks. Nevertheless, this paper will show certain shortcomings in their protocol, like vulnerability against identity guessing, password guessing, and user impersonation attacks. Additionally, it lacks in rendering strong user anonymity and truly two-factor security. Following the crypt-analysis, we propose an improved multi-server authentication protocol, that resists all recognized attacks, including these traps. The formal analysis using broadly accepted BAN-logic assures that the proposed protocol provides mutual authentication among the user and service-providing server. Additionally, the automated verification using the "Automated Validation of Internet Security Protocols and Applications" (AVISPA) tool asserts that improved protocol is safe toward active attacks. The performance comparison with the Ying-Nayak's protocol is evident that the proposed protocol is efficient concerning computational complexity and communication costs.
引用
收藏
页数:11
相关论文
共 34 条
  • [1] Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography
    Ying, Bidi
    Nayak, Amiya
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 131 : 66 - 74
  • [2] Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Wu, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 2052 - 2064
  • [3] Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol
    Georgescu, Adela
    INTERNATIONAL JOINT CONFERENCE SOCO'14-CISIS'14-ICEUTE'14, 2014, 299 : 495 - 504
  • [4] Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments
    Xu, Zhiqiang
    He, Debiao
    Huang, Xinyi
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 595 - 605
  • [5] An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
    Wen-Bin Hsieh
    Jenq-Shiou Leu
    The Journal of Supercomputing, 2014, 70 : 133 - 148
  • [6] An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 133 - 148
  • [7] Two-Factor User Authentication in Multi-Server Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Fang, Chun-I
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 261 - 268
  • [8] Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks
    Yulei Chen
    Jianhua Chen
    Multimedia Tools and Applications, 2021, 80 : 15291 - 15313
  • [9] Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks
    Chen, Yulei
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (10) : 15291 - 15313
  • [10] Effective and Secure Two-Factor Multi-Server Authentication Scheme without Password
    Sun, Shuwan
    Bian, Weixin
    Xie, Dong
    Jie, Biao
    Huang, Yi
    2022 3RD INFORMATION COMMUNICATION TECHNOLOGIES CONFERENCE (ICTC 2022), 2022, : 156 - 161