Design of a lightweight two-factor authentication scheme with smart card revocation

被引:19
|
作者
Mishra, Dheerendra [1 ]
Chaturvedi, Ankita [2 ]
Mukhopadhyay, Sourav [2 ]
机构
[1] LNM Inst Informat Technol, Dept Mat, Jaipur, Rajasthan, India
[2] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Authentication; Smart card; Anonymity;
D O I
10.1016/j.jisa.2015.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart card based authentication schemes present user-friendly and secure communication mechanism over insure public channel. Recently, Li et al. designed an authentication scheme with pre-smart card authentication to present efficient login phase and user-friendly password change phase. It can quickly detect illegitimate login attempt. We analyze the security of Li et al.'s scheme, and identify the scheme insecure. Moreover, their scheme requires the computation of public key operations. To address the security and efficiency of mutual authentication design, we propose a lightweight authentication scheme, which supports smart card revocation. The proposed scheme requires the computation of only hash function and exclusive-or operations. Furthermore, we verify the correctness of mutual authentication using the widely-accepted BAN (Burrows, Abadi, and Needham) logic. Through the security and performance analysis, we show that our scheme is secure and computationally efficient than the existing schemes. Furthermore, the proposed scheme present efficient login and password change phases where incorrect login is quickly detected, and a user can freely change his password without server assistance. (C) 2015 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:44 / 53
页数:10
相关论文
共 50 条
  • [21] Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city
    Xie, Qi
    Hwang, Lingfeng
    NEUROCOMPUTING, 2019, 347 : 131 - 138
  • [22] 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET
    Wang, Fei
    Xu, Yongjun
    Zhang, Hanwen
    Zhang, Yujun
    Zhu, Liehuang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (02) : 896 - 911
  • [23] An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card
    Karthigaiveni, M.
    Indrani, B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019,
  • [24] Two-factor localized authentication scheme for WLAN roaming
    Lin, Xiaodong
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1172 - 1178
  • [25] Two-factor authentication scheme using attribute and password
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [26] A novel optical two-factor face authentication scheme
    Verma, Gaurav
    Liao, Meihua
    Lu, Dajiang
    He, Wenqi
    Peng, Xiang
    OPTICS AND LASERS IN ENGINEERING, 2019, 123 : 28 - 36
  • [27] A Two-Factor Authentication Scheme based on Negative Databases
    Liu, Ran
    Wang, Xiang
    Wang, Can
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1110 - 1115
  • [28] Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INFOCOMMUNICATIONS JOURNAL, 2018, 10 (01): : 10 - 14
  • [29] A Two-Factor Authentication Scheme for Moving Connected Vehicles
    Suo, Dajiang
    Sarma, Sanjay E.
    2022 IEEE 96TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-FALL), 2022,
  • [30] An Improved Lightweight Two-Factor Authentication Protocol for IoT Applications
    Modarres, Amir Masoud Aminian
    Sarbishaei, Ghazaleh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6588 - 6598