An Efficient and Secure Two-Factor Password Authentication Scheme With Card Reader(Terminal) Verification

被引:4
|
作者
Xiong, Wanjun [1 ]
Zhou, Fan [1 ]
Wang, Ruomei [1 ]
Lan, Rushi [2 ]
Sun, Xiyan [3 ]
Luo, Xiaonan [4 ]
机构
[1] Sun Yat Sen Univ, Natl Engn Res Ctr Digital Life, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
[3] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Peoples R China
[4] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Two-factor; password authentication; elliptic curve cryptography; smart card; malicious card reader attack; REMOTE AUTHENTICATION; SMART CARD; MUTUAL AUTHENTICATION; IMPROVEMENT; PROTOCOL;
D O I
10.1109/ACCESS.2018.2869535
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With regard to the privacy of client-server communication systems, most research works have concentrated on authentication to guarantee security. Among the investigated schemes, two-factor password authentication has been a major focus and has undergone considerable development. Two-factor password authentication is a process in which both a password and a physical object are used for authentication to achieve a higher level of security. However, these methods are still subject to some security vulnerabilities, such as malicious card reader attacks, man-in-the-middle attacks, and a lack of perfect forward secrecy. Moreover, although there are many evaluation criteria, there still lacks a set of universal criteria. To address these issues, a two-factor password authentication scheme is proposed in the context of practical application environment in this paper, such as side-channel attacks. Moreover, a card reader verification step is added to the authentication scheme to counteract malicious card reader attacks. In addition, the proposed scheme can resist various known attacks, including replay attacks, lost or stolen smart card attacks, and man-in-the-middle attacks. We present a detailed security analysis and comparative evaluation, and we prove the security of our scheme with Burrows-Abadi-Needham (BAN) logic. Compared with previous schemes, the main advantages of the proposed scheme are its low computational cost, guaranteed security, and better adaptability to actual client-server communication environments.
引用
收藏
页码:70707 / 70719
页数:13
相关论文
共 50 条
  • [1] Efficient Two-Factor Authentication Protocol Using Password and Smart Card
    Liu, Fenghua
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (12) : 3257 - 3263
  • [2] Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security
    Mishra, Dheerendra
    [J]. CRYPTOLOGIA, 2018, 42 (02) : 146 - 175
  • [3] Effective and Secure Two-Factor Multi-Server Authentication Scheme without Password
    Sun, Shuwan
    Bian, Weixin
    Xie, Dong
    Jie, Biao
    Huang, Yi
    [J]. 2022 3RD INFORMATION COMMUNICATION TECHNOLOGIES CONFERENCE (ICTC 2022), 2022, : 156 - 161
  • [4] Two-factor authentication scheme using attribute and password
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [5] A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens
    Li, Shanshan
    Xu, Chunxiang
    Zhang, Yuan
    Zhou, Jianying
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3525 - 3538
  • [6] A Usable and Secure Two-Factor Authentication Scheme
    Akram, Syed
    Misbahuddin, Mohammed
    Varaprasad, G.
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 169 - 182
  • [7] Cryptanalysis of an Efficient and Secure Smart Card Based Password Authentication Scheme
    Liu, Chi-Wei
    Tsai, Cheng-Yi
    Hwang, Min-Shiang
    [J]. RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 188 - 193
  • [8] Two-factor authentication schemes based smart card and password with user anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. Journal of Computational Information Systems, 2013, 9 (21): : 8831 - 8838
  • [9] Smart card based secure password authentication scheme
    Wang, SJ
    Chang, JF
    [J]. COMPUTERS & SECURITY, 1996, 15 (03) : 231 - 237
  • [10] Security analysis and design of an efficient ECC-based two-factor password authentication scheme
    Maitra, Tanmoy
    Obaidat, Mohammad S.
    Islam, Sk Hafizul
    Giri, Debasis
    Amin, Ruhul
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4166 - 4181