An anonymous and provably secure authentication scheme for mobile user

被引:33
|
作者
Islam, S. K. Hafizul [1 ]
Obaidat, Mohammad S. [2 ,3 ]
Amin, Ruhul [4 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani 333031, Rajasthan, India
[2] Fordham Univ, Dept Comp & Informat Sci, IEEE, 441 East Fordham Rd,JMH 340 Bronx, New York, NY 10458 USA
[3] Fordham Univ, Dept Comp & Informat Sci, SCS, 441 East Fordham Rd,JMH 340 Bronx, New York, NY 10458 USA
[4] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
extended chaotic maps; provable security; password; mobile device; authentication; hash function; KEY AGREEMENT PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; EFFICIENT;
D O I
10.1002/dac.3126
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Chebyshev chaotic map is an important tool used in the domain of cryptography to develop different schemes for numerous applications. In 2014, Lin put forwarded a mobile user authentication system using dynamic identity and chaotic map. Lin declared that the scheme offers mutual authentication and session key agreement between user and server. Moreover, they stated that the scheme offers user anonymity and resilience against known attacks. However, we carefully examined Lin's scheme and found that it is no longer usable for practical applications as (i) it has no facility to identify the wrong password and identity, which are inputted by the user during login and password update phases, (ii) it has no facility to protect user impersonation attack, and (iii) it has the problem of session key forward secrecy. We put forwarded an enhanced scheme based on extended chaotic map to repair the fragilities of Lin's scheme. We formally examined the security of our scheme and demonstrated that it is provably secured in random oracle model. Further, we presented some informal cryptanalysis to make sure that the enhanced scheme is secure from known attacks. Our scheme is also computation efficient against other competitive protocols. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1529 / 1544
页数:16
相关论文
共 50 条
  • [21] An efficient and secure anonymous authentication scheme for mobile satellite communication systems
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Hong, Jeong-Woo
    Yoon, Sang-Yoon
    Park, Dong-In
    Choi, Myung-Jin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [22] CCMbAS: A Provably Secure CCM-Based Authentication Scheme for Mobile Internet
    Zhang, Yu
    Sun, Guangmin
    Zhai, Peng
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [23] An efficient and secure anonymous authentication scheme for mobile satellite communication systems
    Eun-Jun Yoon
    Kee-Young Yoo
    Jeong-Woo Hong
    Sang-Yoon Yoon
    Dong-In Park
    Myung-Jin Choi
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [24] Provably secure anonymous three-factor authentication scheme for multi-server environments
    Xu, Dongqing
    Chen, Jianhua
    Liu, Qin
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (02) : 611 - 627
  • [25] A provably secure password-based anonymous authentication scheme for wireless body area networks
    Wei, Fushan
    Vijayakumar, P.
    Shen, Jian
    Zhang, Ruijie
    Li, Li
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 65 : 322 - 331
  • [26] A Provably-Anonymous Authentication Scheme for Roaming Services
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Paik, Juryon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 193 - 203
  • [27] Provably secure anonymous three-factor authentication scheme for multi-server environments
    Dongqing Xu
    Jianhua Chen
    Qin Liu
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 611 - 627
  • [28] A provably secure pairing-free anonymous handover authentication protocol for mobile wireless networks
    Ogundoyin, Sunday Oyinlola
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2020, 18 (05) : 509 - 539
  • [29] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [30] A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System
    Wen, Fengtong
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)