Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things

被引:150
|
作者
Roy, Sandip [1 ]
Chatterjee, Santanu [2 ]
Das, Ashok Kumar [3 ]
Chattopadhyay, Samiran [4 ]
Kumari, Saru [5 ]
Jo, Minho [6 ]
机构
[1] Asansol Engn Coll, Dept Comp Sci & Engn, Asansol 713305, India
[2] Def Res & Dev Org, Res Ctr Imarat, Hyderabad 500069, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[5] Chaudhary Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[6] Korea Univ, Dept Comp Convergence Software, Sejong 30019, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 04期
基金
新加坡国家研究基金会;
关键词
Biometrics; Burrows-Abadi-Needham (BAN) logic; chaotic map; crowdsourcing; Internet of Things (IoT); ProVerif; 1.93; security; user authentication; KEY AGREEMENT SCHEME; SMART-CARDS; SECURITY; PROTOCOL; EFFICIENT; COMMUNICATION; ENVIRONMENT; FRAMEWORK;
D O I
10.1109/JIOT.2017.2714179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent proliferation of mobile devices, such as smartphones and wearable devices has given rise to crowdsourcing Internet of Things (IoT) applications. E-healthcare service is one of the important services for the crowdsourcing IoT applications that facilitates remote access or storage of medical server data to the authorized users (for example, doctors, patients, and nurses) via wireless communication. As wireless communication is susceptible to various kinds of threats and attacks, remote user authentication is highly essential for a hazard-free use of these services. In this paper, we aim to propose a new secure three-factor user remote user authentication protocol based on the extended chaotic maps. The three factors involved in the proposed scheme are: 1) smart card; 2) password; and 3) personal biometrics. As the proposed scheme avoids computationally expensive elliptic curve point multiplication or modular exponentiation operation, it is lightweight and efficient. The formal security verification using the widely-accepted verification tool, called the ProVerif 1.93, shows that the presented scheme is secure. In addition, we present the formal security analysis using the both widely accepted real-or-random model and Burrows-Abadi-Needham logic. With the combination of high security and appreciably low communication and computational overheads, our scheme is very much practical for battery limited devices for the healthcare applications as compared to other existing related schemes.
引用
收藏
页码:2884 / 2895
页数:12
相关论文
共 50 条
  • [21] User Anonymous Authentication Key Exchange Protocol Based on Biometrics and Password
    Cao, Fengkuan
    Wei, Wenxve
    2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1344 - 1350
  • [22] An Improved Lightweight User Authentication Scheme for the Internet of Medical Things
    Kim, Keunok
    Ryu, Jihyeon
    Lee, Youngsook
    Won, Dongho
    SENSORS, 2023, 23 (03)
  • [23] Cryptanalysis and Improvement of A Mutual User Authentication Scheme for the Internet of Things
    Limbasiya, Trupil
    Karati, Arijit
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 168 - 173
  • [24] An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
    Zhou, Yousheng
    Zhou, Junfeng
    Wang, Feng
    Guo, Feng
    APPLIED COMPUTATIONAL INTELLIGENCE AND SOFT COMPUTING, 2016, 2016
  • [25] Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment"
    Hussain, Sajid
    Chaudhry, Shehzad Ashraf
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10936 - 10940
  • [26] Chaotic Map-Based Authentication Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle
    Cui, Jie
    Yu, Jing
    Zhong, Hong
    Wei, Lu
    Liu, Lu
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (03) : 3167 - 3181
  • [27] A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map
    Wang, Feifei
    Xu, Guoai
    Xu, Guosheng
    IEEE ACCESS, 2019, 7 : 101596 - 101608
  • [28] Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things
    Liu, Wenzheng
    Wang, Xiaofeng
    Peng, Wei
    IEEE ACCESS, 2020, 8 : 8754 - 8767
  • [29] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    A. Jabbari
    J. B. Mohasefi
    Wireless Personal Communications, 2021, 116 : 2565 - 2591
  • [30] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    Jabbari, A.
    Mohasefi, J. B.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 2565 - 2591