An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo’s Scheme

被引:0
|
作者
Azeem Irshad
Muhammad Sher
Muhammad Usman Ashraf
Bander A. Alzahrani
Fan Wu
Qi Xie
Saru Kumari
机构
[1] International Islamic University,Computer Science Department
[2] Xiamen Institute of Technology,Department of Computer Science and Engineering
[3] King Abdulaziz University,College of Computing and Information Technology
[4] Hangzhou Normal University,Hangzhou Key Laboratory of Cryptography and Network Security
[5] Chaudhary Charan Singh University,Department of Mathematics
[6] University of Agriculture,IBMS
[7] Faisalabad,undefined
来源
关键词
Multi-server authentication; Remote authentication; Attacks; Chebyshev chaotic map;
D O I
暂无
中图分类号
学科分类号
摘要
The simple password based authentication techniques have been evolving into more secure and advanced protocols, capable of countering the advanced breed of threats. Following this development, the multi-server authentication (MSA), lets subscribers the provision of services from various service providers out of a single registration performed initially. The user seeks to register from registration centre first, and could avail a range of services onwards. The research efforts on MSA based framework, for making it lightweight and security resilient, has been going on a reasonable pace. However, yet we have not come up with a framework that can be relied upon for deployment in an access network bearing nodes that demand low computational cost. Recently, in this regard, Tsai and Lo presented a chaotic map-based multi-server authentication protocol. However, the Tsai and Lo scheme is found vulnerable to key-compromise impersonation attack, Bergamo et al. and password guessing attack by Lu et al. In return, Lu et al. presented a model countering the flaws of Tsai and Lo scheme. We review both schemes and found that Tsai et al. is still vulnerable to more threats, and at the same time, we demonstrate that Lu et al. is also vulnerable to RC-spoofing attack, replay attack, anonymity failure and bears some technical flaws. In this paper, we propose a secure and efficient scheme improved upon Tsai et al. protocol. Besides, this study work presents the formal security analysis using BAN logic and performance efficiency has also been evaluated against contemporary protocols.
引用
收藏
页码:3185 / 3208
页数:23
相关论文
共 50 条
  • [1] An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme
    Irshad, Azeem
    Sher, Muhammad
    Ashraf, Muhammad Usman
    Alzahrani, Bander A.
    Wu, Fan
    Xie, Qi
    Kumari, Saru
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 3185 - 3208
  • [2] An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ali, Sajid
    Kumari, Saru
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (02): : 211 - 224
  • [3] A provably secure multi-server authentication scheme based on Chebyshev chaotic map
    Chen, Rui
    Mou, Yongcong
    Li, Wei
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [4] Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
    Irshad, Azeem
    Sher, Muhammad
    Alzahrani, Bander A.
    Albeshri, Aiiad
    Chaudhry, Shehzad Ashraf
    Kumari, Saru
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 523 - 549
  • [5] Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
    Chatterjee, Santanu
    Roy, Sandip
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 824 - 839
  • [6] A Secure Biometric Based L ser Authentication Scheme for Multi-server Environment Using Chaotic Map
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Polai, Monalisha
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 637 - 642
  • [7] A Provably Secure Multi-server Based Authentication Scheme
    Kuo-Hui Yeh
    [J]. Wireless Personal Communications, 2014, 79 : 1621 - 1634
  • [8] A Provably Secure Multi-server Based Authentication Scheme
    Yeh, Kuo-Hui
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (03) : 1621 - 1634
  • [9] An authentication scheme for multi-server environments based on chaotic maps
    Tao, Yun
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (03) : 250 - 261
  • [10] An improved and secure chaotic map based authenticated key agreement in multi-server architecture
    Azeem Irshad
    Muhammad Sher
    Shehzad Ashraf Chaudhry
    Qi Xie
    Saru Kumari
    Fan Wu
    [J]. Multimedia Tools and Applications, 2018, 77 : 1167 - 1204