ELAKA: Energy-Efficient and Lightweight Multi-Server Authentication and Key Agreement Protocol Based on Dynamic Biometrics

被引:3
|
作者
Liu, Xiaoxue [1 ]
Li, Yanping [1 ]
Qu, Juan [2 ]
Lu, Laifeng [1 ]
机构
[1] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710062, Shaanxi, Peoples R China
[2] Chongqing Three Gorges Univ, Sch Math & Stat, Wanzhou 414100, Peoples R China
基金
中国国家自然科学基金;
关键词
Energy-efficient; Multi-server; Lightweight; Biometrics; BAN logic; USER AUTHENTICATION; SMART CARDS; SCHEME;
D O I
10.1007/s11277-018-5348-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Authentication and key agreement (AKA) provides flexible and convenient sercices. Most traditional AKA protocols are designed to apply in single-server environment, where a user has to register at different servers to access different types of network services and the user have to remember or manage a large number of usernames and passwords. Later, multi-server AKA protocols resolve the repeated registration problem of single-server AKA protocols, where a user can access different servers to get different services using a single registration and the same username and password. Recently, in 2015, Lu et al proposed a light-weight ID based authentication and key agreement protocol for multi-server architecture, referred to as LAKA protocol. They claimed their protocol can overcome all shortcomings which existed in Xue et al's protocol. Unfortunately, our further research shows that LAKA protocol still suffers from server spoofing attack, stolen smart card attack etc. To overcome the weakness of LAKA protocol, an energy-efficient and lightweight authentication and key agreement protocol for multi-server architecture is proposed (abbreviated to ELAKA). The ELAKA protocol not only provides the security features declared by LAKA protocol, but also has some other advantages. First, the ELAKA protocol can realize authentication and key agreement just by three handshakes with extremely low communication cost and computation cost between users and servers, which can achieve a delicate balance of security and performance. Second, ELAKA protocol can enable the user enjoy the remote services with privacy protection. Finally the ELAKA protocol is proved secure against known possible attacks by using BAN logic. As a result, these features make ELAKA protocol is very suitable for computation-limited mobile devices (such as smartphone, PAD, tablets) in comparison to other related existing protocols.
引用
收藏
页码:767 / 785
页数:19
相关论文
共 50 条
  • [1] ELAKA: Energy-Efficient and Lightweight Multi-Server Authentication and Key Agreement Protocol Based on Dynamic Biometrics
    Xiaoxue Liu
    Yanping Li
    Juan Qu
    Laifeng Lu
    [J]. Wireless Personal Communications, 2018, 100 : 767 - 785
  • [2] An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3371 - 3396
  • [3] A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
    Xue, Kaiping
    Hong, Peilin
    Ma, Changsha
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (01) : 195 - 206
  • [4] A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment
    Prasanta Kumar Roy
    Ansuman Bhattacharya
    [J]. The Journal of Supercomputing, 2022, 78 : 5903 - 5930
  • [5] A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (04): : 5903 - 5930
  • [6] Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme
    Kim, Hakhyun
    Jeon, Woongryul
    Lee, Kwangwoo
    Lee, Yunho
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2012, PT III, 2012, 7335 : 391 - 406
  • [7] An efficient and secure multi-server authentication scheme with key agreement
    Tsaur, Woei-Jiunn
    Li, Jia-Hong
    Lee, Wei-Bin
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) : 876 - 882
  • [8] Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments
    Yang, Li
    Zheng, Zhiming
    [J]. PLOS ONE, 2018, 13 (03):
  • [9] A Secure Biometrics and PUFs-Based Authentication Scheme With Key Agreement For Multi-Server Environments
    Zhao, Jun
    Bian, Weixin
    Xu, Deqin
    Jie, Biao
    Ding, Xintao
    Zhou, Wen
    Zhang, Hui
    [J]. IEEE ACCESS, 2020, 8 : 45292 - 45303
  • [10] Lightweight identity authentication protocol based on dynamic ID in multi-server environment
    Qi, Xiaochen
    Li, Meihong
    Du, Ye
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2021, 47 (12): : 2632 - 2640