A secure dynamic identity based authentication protocol for multi-server architecture

被引:182
|
作者
Sood, Sandeep K. [1 ]
Sarje, Anil K. [1 ]
Singh, Kuldip [1 ]
机构
[1] Indian Inst Technol, Dept Elect & Comp Engn, Roorkee, Uttar Pradesh, India
关键词
Authentication protocol; Smart card; Dynamic identity; Password; Multi-server architecture; PASSWORD AUTHENTICATION; SCHEME;
D O I
10.1016/j.jnca.2010.11.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the password based authentication protocols rely on single authentication server for the user's authentication. User's verification information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. In 2009, Hsiang and Shih improved Liao and Wang's dynamic identity based smart card authentication protocol for multi-server environment. However, we found that Hsiang and Shih's protocol is susceptible to replay attack, impersonation attack and stolen smart card attack. Moreover, the password change phase of Hsiang and Shih's protocol is incorrect. This paper presents a secure dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned security flaws, while keeping the merits of Hsiang and Shih's protocol. It uses two-server paradigm in which different levels of trust are assigned to the servers and the user's verifier information is distributed between these two servers known as the service provider server and the control server. The service provider server is more exposed to the clients than the control server. The back-end control server is not directly accessible to the clients and thus it is less likely to be attacked. The user's smart card uses stored information in it and random nonce value to generate dynamic identity. The proposed protocol is practical and computationally efficient because only nonce, one-way hash functions and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:609 / 618
页数:10
相关论文
共 50 条
  • [41] A robust authentication protocol for multi-server architecture using elliptic curve cryptography
    Zhang, Xueqin
    Wang, Baoping
    Zhang, Wenpeng
    International Journal of Network Security, 2019, 21 (02) : 191 - 198
  • [42] A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC
    Qi, Mingping
    Chen, Jianhua
    Chen, Yitao
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2018, 164 : 101 - 109
  • [43] A secure three factor-based fully anonymous user authentication protocol for multi-server environment
    Mahor, Vinod Kumar
    Padmavathi, R.
    Chatterjee, Santanu
    Dewangan, Sanshray Kumar
    Kumar, Manish
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (01) : 45 - 60
  • [44] A Novel Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards
    Xu, Chengbo
    Jia, Zhongtian
    Wen, Fengtong
    Ma, Yan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 105 - 118
  • [45] TIME-BOUND BASED AUTHENTICATION SCHEME FOR MULTI-SERVER ARCHITECTURE
    Chang, Chin-Chen
    Lee, Jung-San
    Ku, Jui-Yi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (11): : 2987 - 2996
  • [46] Cryptanalysis and Improvement of a Biometrics-based Multi-server Authentication Protocol
    Gu, Yi
    Li, Shengqiang
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 16 - 20
  • [47] An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment
    Tomar, Ashish
    Dhar, Joydip
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (01) : 351 - 372
  • [48] An Improvement of A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
    Hwang, Min-Shiang
    Li, Hou-Wen
    Yang, Cheng-Ying
    International Journal of Network Security, 2024, 26 (04) : 713 - 718
  • [49] A provably secure multi-server authentication scheme based on Chebyshev chaotic map
    Chen, Rui
    Mou, Yongcong
    Li, Wei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [50] Design of a secure smart card-based multi-server authentication scheme
    Chaturvedi, Ankita
    Das, Ashok Kumar
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 30 : 64 - 80