Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things

被引:150
|
作者
Roy, Sandip [1 ]
Chatterjee, Santanu [2 ]
Das, Ashok Kumar [3 ]
Chattopadhyay, Samiran [4 ]
Kumari, Saru [5 ]
Jo, Minho [6 ]
机构
[1] Asansol Engn Coll, Dept Comp Sci & Engn, Asansol 713305, India
[2] Def Res & Dev Org, Res Ctr Imarat, Hyderabad 500069, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[5] Chaudhary Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[6] Korea Univ, Dept Comp Convergence Software, Sejong 30019, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 04期
基金
新加坡国家研究基金会;
关键词
Biometrics; Burrows-Abadi-Needham (BAN) logic; chaotic map; crowdsourcing; Internet of Things (IoT); ProVerif; 1.93; security; user authentication; KEY AGREEMENT SCHEME; SMART-CARDS; SECURITY; PROTOCOL; EFFICIENT; COMMUNICATION; ENVIRONMENT; FRAMEWORK;
D O I
10.1109/JIOT.2017.2714179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent proliferation of mobile devices, such as smartphones and wearable devices has given rise to crowdsourcing Internet of Things (IoT) applications. E-healthcare service is one of the important services for the crowdsourcing IoT applications that facilitates remote access or storage of medical server data to the authorized users (for example, doctors, patients, and nurses) via wireless communication. As wireless communication is susceptible to various kinds of threats and attacks, remote user authentication is highly essential for a hazard-free use of these services. In this paper, we aim to propose a new secure three-factor user remote user authentication protocol based on the extended chaotic maps. The three factors involved in the proposed scheme are: 1) smart card; 2) password; and 3) personal biometrics. As the proposed scheme avoids computationally expensive elliptic curve point multiplication or modular exponentiation operation, it is lightweight and efficient. The formal security verification using the widely-accepted verification tool, called the ProVerif 1.93, shows that the presented scheme is secure. In addition, we present the formal security analysis using the both widely accepted real-or-random model and Burrows-Abadi-Needham logic. With the combination of high security and appreciably low communication and computational overheads, our scheme is very much practical for battery limited devices for the healthcare applications as compared to other existing related schemes.
引用
收藏
页码:2884 / 2895
页数:12
相关论文
共 50 条
  • [31] A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
    Abbas, Ghulam
    Tanveer, Muhammad
    Abbas, Ziaul Haq
    Waqas, Muhammad
    Baker, Thar
    Obe, Dhiya Al-Jumeily
    PLOS ONE, 2021, 16 (11):
  • [32] An efficient biometric based remote user authentication scheme for secure internet of things environment
    Roy, Sandip
    Chatterjee, Santanu
    Mahapatra, Gautam
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) : 1403 - 1410
  • [33] Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card
    Meshram, Chandrashekhar
    Meshram, Sarita Gajbhiye
    Ibrahim, Rabha W.
    Jalab, Hamid A.
    Jamal, Sajjad Shaukat
    Barve, Sharad Kumar
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (02) : 973 - 987
  • [34] Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card
    Chandrashekhar Meshram
    Sarita Gajbhiye Meshram
    Rabha W. Ibrahim
    Hamid A. Jalab
    Sajjad Shaukat Jamal
    Sharad Kumar Barve
    Complex & Intelligent Systems, 2022, 8 : 973 - 987
  • [35] Remote User Authentication Scheme A comparative analysis and improved behavioral biometrics based authentication scheme
    Kumar, Pramod
    Rauthan, Manmohan Singh
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 311 - 313
  • [36] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Hao, Xinhong
    Wang, Jiantao
    Yang, Qinghai
    Yan, Xiaopeng
    Li, Ping
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [37] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    Journal of Medical Systems, 2013, 37
  • [38] SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics
    Riaz, Rabia
    Gillani, Noor-ul-Ain
    Rizvi, SanamShahla
    Shokat, Sana
    Kwon, Se Jin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [39] A lightweight biometrics based remote user authentication scheme for IoT services
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 : 255 - 270
  • [40] User Authentication Scheme for Internet of Things Using Near-Field Communication
    Alharbi, Muhammad H.
    Alhazmi, Omar H.
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2020, 27 (05)