A Provably Secure User Authentication Scheme Over Unreliable Networks

被引:0
|
作者
Toan-Thinh Truong [1 ]
Minh-Triet Tran [1 ]
Anh-Duc Duong [2 ]
Anh-Duy Tran [1 ]
机构
[1] Univ Sci, Vietnam Natl Univ Ho Chi Minh City, Ho Chi Minh City, Vietnam
[2] Ho Chi Minh City Govt, Ho Chi Minh City Peoples Comm, Ho Chi Minh City 700000, Vietnam
关键词
D O I
10.1007/978-3-030-99584-3_52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wearable devices not only are the advancement in reduction of computation-systems, but also convenient for indirect interactions. Financial or medical data are exchanged between these devices through unreliable networks must be kept secret. Hence, lightweight and secure user authentication schemes always receive special attentions of many works in information security. Recently, Saleem et al. and Kandar et al. proposed a provable biometrics-based scheme providing the users with guarantee of secure authentication. Although elliptic curve cryptosystem-based combined with cryptographic-hash function, their schemes fail to satisfy session-key perfect forward secrecy and not applicable in practice. In this paper, we provide an improved version of their scheme to overcome these limitations.
引用
收藏
页码:602 / 613
页数:12
相关论文
共 50 条
  • [1] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [2] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [3] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 1 - 20
  • [4] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 1 - 20
  • [5] A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Karuppiah, Marimuthu
    Baliyan, Renuka
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3527 - 3542
  • [6] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [7] Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks
    Ryu, Jihyeon
    Song, Taeui
    Moon, Jongho
    Kim, Hyoungshick
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 49 - 58
  • [8] Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks
    Xu, Guoai
    Wang, Feifei
    Zhang, Miao
    Peng, Junhao
    [J]. IEEE ACCESS, 2020, 8 : 47282 - 47294
  • [9] Provably secure biometric-based client–server secure communication over unreliable networks
    Saleem, Muhammad Asad
    Islam, SK Hafizul
    Ahmed, Shafiq
    Mahmood, Khalid
    Hussain, Majid
    [J]. Journal of Information Security and Applications, 2021, 58
  • [10] A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks
    Wang Hong
    Li Jianhua
    Lai Chengzhe
    Wang Zhe
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 53 - 63