Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity

被引:14
|
作者
Kang, Dongwoo [1 ]
Jung, Jaewook [1 ]
Kim, Hyoungshick [1 ]
Lee, Youngsook [2 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, 2066 Seoburo, Suwon 440746, Gyeonggido, South Korea
[2] Howon Univ, Dept Cyber Secur, 64 Howondae 3 Gil, Gunsan Si 54058, Jeonrabuk Do, South Korea
基金
新加坡国家研究基金会;
关键词
PASSWORD AUTHENTICATION; REMOTE;
D O I
10.1155/2018/9046064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, a number of users employ an authentication protocol so as to enjoy protected electronic transactions in wireless networks. In order to establish an efficient and robust the transaction system, numerous researches have been conducted relating to authentication protocols. Recently, Kaul and Awasthi presented an user authentication and key agreement scheme, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent two kinds of attacks, including off-line password guessing attacks and user impersonation attacks. Second, user anonymity rule cannot be upheld. Third, session key can be compromised by an attacker. Fourth, there is high possibility that the time synchronization trouble occurs. Therefore, we suggest an upgraded version of the user authenticated key agreement method that provides enhanced security. Our security and performance analysis shows that compared, to other associated protocols, our method not only improves the security level but also ensures efficiency.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] An Efficient Provably Secure Password-Based Authenticated Key Agreement
    Xu, Hanqiu
    Wang, Qingping
    Zhou, Jing
    Ruan, Ou
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 423 - 434
  • [42] Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1983 - 2001
  • [43] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [45] A secure identification and key agreement protocol with user anonymity (SIKA)
    Mangipudi, Kumar
    Katti, Rajendra
    [J]. COMPUTERS & SECURITY, 2006, 25 (06) : 420 - 425
  • [46] A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Karuppiah, Marimuthu
    Baliyan, Renuka
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3527 - 3542
  • [47] An Improved User Authentication and Key Agreement Scheme Providing User Anonymity
    Ya-Fen Chang and Pei-Yu Chang Department of Computer Science and Information Engineering
    [J]. Journal of Electronic Science and Technology, 2011, 9 (04) : 352 - 358
  • [48] Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT
    Vinoth, R.
    Deborah, Lazarus Jegatha
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) : 3801 - 3811
  • [49] Provably Secure Authenticated Key Agreement Scheme for Smart Grid
    Odelu, Vanga
    Das, Ashok Kumar
    Wazid, Mohammad
    Conti, Mauro
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1900 - 1910
  • [50] An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
    Baruah, Barnana
    Dhal, Subhasish
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 447 - 455