Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks

被引:18
|
作者
Xie, Qi [1 ]
Tang, Zhixiong [1 ]
Chen, Kefei [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog & Network Secur, Hangzhou 311121, Zhejiang, Peoples R China
关键词
Three-factor; Authentication; Mobile networks; Anonymity; PRIVACY; SECURE;
D O I
10.1016/j.compeleceng.2016.11.038
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication protocol is an important security mechanism for mobile networks. Recently, Wu et al. proposed a biometrics-based three-factor user authentication scheme using elliptic curve cryptography for mobile networks. However, in this paper, we find out that their scheme is vulnerable to the impersonation attack, because de/encryption key of the server and the user can be computed by an adversary. And then an improved three factor authentication scheme for mobile client-server networks is proposed to overcome the weakness. The proposed scheme uses a random nonce to decrypt and encrypt messages without using the server's public key for reducing computation cost and avoiding the key management problem, and it also achieves user's anonymity. In addition, we apply the pi calculus-based formal verification tool ProVerif for security evaluations, and compare our scheme with some related schemes to show that the proposed scheme is both secure and efficient. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:218 / 230
页数:13
相关论文
共 50 条
  • [1] Cryptanalysis and improvement of a three-factor user authentication scheme for smart grid environment
    Grover H.S.
    Adarsh
    Kumar D.
    [J]. Journal of Reliable Intelligent Environments, 2020, 6 (04): : 249 - 260
  • [2] A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Wu, Fan
    Sangaiah, Arun Kumar
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 : 194 - 204
  • [3] Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks
    Ryu, Jihyeon
    Song, Taeui
    Moon, Jongho
    Kim, Hyoungshick
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 49 - 58
  • [4] Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks
    Renuka, Km
    Kumar, Sachin
    Kumari, Saru
    Chen, Chien-Ming
    [J]. SENSORS, 2019, 19 (21)
  • [5] Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems
    Alanazi, Munayfah
    Nashwan, Shadi
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (02): : 703 - 725
  • [6] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [7] A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks
    Zhu, Lianghong
    Xiang, Huaikun
    Zhang, Kai
    [J]. SYMMETRY-BASEL, 2022, 14 (01):
  • [8] Security analysis of a three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
    Tai, Wei-Liang
    Chang, Ya-Fen
    Hou, Po-Lin
    [J]. International Journal of Network Security, 2019, 21 (06): : 1014 - 1020
  • [9] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [10] A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments
    Chang, Ya-Fen
    Tai, Wei-Liang
    Hou, Po-Lin
    Lai, Kuan-Yu
    [J]. SYMMETRY-BASEL, 2021, 13 (07):