Path: Top -> Journal -> Jurnal Internasional -> King Saud University -> 2015 -> Volume 27, Issue 2, April
A robust anonymous biometric-based remote user authentication scheme using smart cards
Oleh : Ashok Kumar Das a , Adrijit Goswami, King Saud University
Dibuat : 2015-04-15, dengan 1 file
Keyword : Remote user authentication Biometrics Smart cards Hash function Cryptanalysis Security
Url : http://www.sciencedirect.com/science/article/pii/S1319157815000178
Sumber pengambilan dokumen : web
Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of Ans scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i) flaw in users biometric verification during the login phase, (ii) flaw in users password verification during the login and authentication phases, and (iii) flaw in users password change locally at any time by the user. Due to these security flaws, Ans scheme cannot support mutual authentication between the user and the server. Further, we show that Ans scheme cannot prevent insider attack. In order to remedy the security weaknesses found in Ans scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in Ans scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with Ans scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | King Saud University |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- , Editor: sukadi
Download...
Download hanya untuk member.
1-s2
File : 1-s2.0-S1319157815000178-main.pdf
(1420333 bytes)