An anonymous and provably secure authentication scheme for mobile user

被引:33
|
作者
Islam, S. K. Hafizul [1 ]
Obaidat, Mohammad S. [2 ,3 ]
Amin, Ruhul [4 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani 333031, Rajasthan, India
[2] Fordham Univ, Dept Comp & Informat Sci, IEEE, 441 East Fordham Rd,JMH 340 Bronx, New York, NY 10458 USA
[3] Fordham Univ, Dept Comp & Informat Sci, SCS, 441 East Fordham Rd,JMH 340 Bronx, New York, NY 10458 USA
[4] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
extended chaotic maps; provable security; password; mobile device; authentication; hash function; KEY AGREEMENT PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; EFFICIENT;
D O I
10.1002/dac.3126
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Chebyshev chaotic map is an important tool used in the domain of cryptography to develop different schemes for numerous applications. In 2014, Lin put forwarded a mobile user authentication system using dynamic identity and chaotic map. Lin declared that the scheme offers mutual authentication and session key agreement between user and server. Moreover, they stated that the scheme offers user anonymity and resilience against known attacks. However, we carefully examined Lin's scheme and found that it is no longer usable for practical applications as (i) it has no facility to identify the wrong password and identity, which are inputted by the user during login and password update phases, (ii) it has no facility to protect user impersonation attack, and (iii) it has the problem of session key forward secrecy. We put forwarded an enhanced scheme based on extended chaotic map to repair the fragilities of Lin's scheme. We formally examined the security of our scheme and demonstrated that it is provably secured in random oracle model. Further, we presented some informal cryptanalysis to make sure that the enhanced scheme is secure from known attacks. Our scheme is also computation efficient against other competitive protocols. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1529 / 1544
页数:16
相关论文
共 50 条
  • [1] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [2] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [3] A provably secure and anonymous message authentication scheme for smart grids
    Li, Xiong
    Wu, Fan
    Kumari, Saru
    Xu, Lili
    Sangaiah, Arun Kumar
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 132 : 242 - 249
  • [4] A provably secure anonymous authentication scheme for Session Initiation Protocol
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Irshad, Azeem
    Ashraf, Muhammad Usman
    Khan, Muhammad Khurram
    Ahmad, Hafiz Farooq
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5016 - 5027
  • [5] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [6] Provably secure anonymous authentication with batch verification for mobile roaming services
    Tsai, Jia-Lun
    Lo, Nai-Wei
    [J]. AD HOC NETWORKS, 2016, 44 : 19 - 31
  • [7] A Provably Secure User Authentication Scheme Over Unreliable Networks
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    Anh-Duy Tran
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, 2022, 449 : 602 - 613
  • [8] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [9] Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks
    Xu, Guoai
    Wang, Feifei
    Zhang, Miao
    Peng, Junhao
    [J]. IEEE ACCESS, 2020, 8 : 47282 - 47294
  • [10] A Provably Secure, Lightweight Protocol for Anonymous Authentication
    Katz, Jonathan
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 271 - 288