A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications

被引:5
|
作者
Li, Xuelei [1 ]
Wen, Qiaoyan [1 ]
Li, Wenmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Authentication; Key agreement; Anonymous; Privacy; Security; SMART CARDS; BIOMETRIC AUTHENTICATION; EFFICIENT;
D O I
10.1007/s11277-015-3008-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Anonymous remote user authentication plays more and more important role in wireless personal communication networks to guarantee systematic security and personal privacy. However, as promising as it is, security and privacy issues have seriously challenged user experience and system performance in the authentication schemes for a long time. In this paper, we propose a remote user authentication scheme for wireless communication networks. Our proposal employs the personal workstation as a trusted proxy to preserve perfect user privacy, while maintaining system security. It not only provides mutual authentication with key agreement mechanism, but also keeps user' privacy private in a reliable domain. In addition, the technologies of Bluetooth (or Wifi) improve user experience and improve user friendliness in three-factor based authentication schemes. Moreover, our scheme supports flexible user login and security level. Finally, the security proof and performance analysis show that our scheme is more efficient and practical.
引用
收藏
页码:1593 / 1610
页数:18
相关论文
共 50 条
  • [21] Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Xiong, Hu
    Wang, Xiaofeng
    Li, Fagen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 256 - 258
  • [22] An enhanced privacy preserving remote user authentication scheme with provable security
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Kumari, Saru
    Khan, Muhammad Khurram
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3782 - 3795
  • [23] An Improvement of Three-Factor Remote User Authentication Protocol Using ECC
    Hwang, Min-Shiang
    Lin, Cheng-Ying
    Wu, Chia-Chun
    International Journal of Network Security, 2024, 26 (03) : 528 - 534
  • [24] A Three-Factor Remote Authentication Scheme for Multi-server Environment
    Cui, Jianming
    Chen, Chen
    Zhang, Xiaojun
    Liu, Yihui
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 694 - 705
  • [25] Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems
    Alanazi, Munayfah
    Nashwan, Shadi
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (02): : 703 - 725
  • [26] An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
    Wang, Chenyu
    Xu, Guoai
    Sun, Jing
    SENSORS, 2017, 17 (12)
  • [28] A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems
    Ashok Kumar Das
    Journal of Medical Systems, 2015, 39
  • [29] On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems
    Jiang, Qi
    Li, Bingyan
    Ma, Jianfeng
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 879 - 884
  • [30] Security analysis of a three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
    Tai, Wei-Liang
    Chang, Ya-Fen
    Hou, Po-Lin
    International Journal of Network Security, 2019, 21 (06) : 1014 - 1020