A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications

被引:5
|
作者
Li, Xuelei [1 ]
Wen, Qiaoyan [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Authentication; Key agreement; Anonymous; Privacy; Security; SMART CARDS; BIOMETRIC AUTHENTICATION; EFFICIENT;
D O I
10.1007/s11277-015-3008-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Anonymous remote user authentication plays more and more important role in wireless personal communication networks to guarantee systematic security and personal privacy. However, as promising as it is, security and privacy issues have seriously challenged user experience and system performance in the authentication schemes for a long time. In this paper, we propose a remote user authentication scheme for wireless communication networks. Our proposal employs the personal workstation as a trusted proxy to preserve perfect user privacy, while maintaining system security. It not only provides mutual authentication with key agreement mechanism, but also keeps user' privacy private in a reliable domain. In addition, the technologies of Bluetooth (or Wifi) improve user experience and improve user friendliness in three-factor based authentication schemes. Moreover, our scheme supports flexible user login and security level. Finally, the security proof and performance analysis show that our scheme is more efficient and practical.
引用
收藏
页码:1593 / 1610
页数:18
相关论文
共 50 条
  • [1] A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications
    Xuelei Li
    Qiaoyan Wen
    Wenmin Li
    Wireless Personal Communications, 2016, 86 : 1593 - 1610
  • [2] Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
    Zhao, Yan
    Li, Shiming
    Jiang, Liehui
    Liu, Tieming
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [3] Robust biometrics based three-factor remote user authentication scheme with key agreement
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 105 - 110
  • [4] Remote three-factor authentication scheme based on Fuzzy extractors
    Zhang, Min
    Zhang, Jiashu
    Zhang, Ying
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 682 - 693
  • [5] Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
    Fan, Chun-I
    Lin, Yi-Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) : 933 - 945
  • [6] Robust three-factor remote user authentication scheme with key agreement for multimedia systems
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    Zhao, Xiaoke
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1916 - 1927
  • [7] A Secure Three-Factor Remote User Authentication Scheme Using Elliptic Curve Cryptosystem
    Ali, Rifaqat
    Pal, Arup Kumar
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING & COMMUNICATION SYSTEMS, MCCS 2015, 2018, 453 : 9 - 24
  • [8] Applying biometrics to design three-factor remote user authentication scheme with key agreement
    Li, Xiong
    Niu, Jianwei
    Wang, Zhibo
    Chen, Caisen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1488 - 1497
  • [9] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Peer-to-Peer Networking and Applications, 2018, 11 : 1 - 20
  • [10] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 1 - 20