Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity
Recently, many dynamic ID based remote user authentication schemes using smart card have been proposed to improve the security in multiple servers architecture authentication systems. In 2017, Kumari and Om proposed an anonymous multi-server authenticated key agreement scheme, which is believed to b...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-07-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/19/14/3144 |
id |
doaj-e50892379bd14fb7b321e285efbf7811 |
---|---|
record_format |
Article |
spelling |
doaj-e50892379bd14fb7b321e285efbf78112020-11-25T02:34:56ZengMDPI AGSensors1424-82202019-07-011914314410.3390/s19143144s19143144Robust Multiple Servers Architecture Based Authentication Scheme Preserving AnonymityHuawei Wang0Dianli Guo1Hua Zhang2Qiaoyan Wen3State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaThe 6th Research Institute of China Electronics Corporation, Beijing 100083, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaRecently, many dynamic ID based remote user authentication schemes using smart card have been proposed to improve the security in multiple servers architecture authentication systems. In 2017, Kumari and Om proposed an anonymous multi-server authenticated key agreement scheme, which is believed to be secure against a range of network attacks. Nevertheless, in this paper we reanalyze the security of their scheme, and show that the scheme is vulnerable to impersonation attack and server spoofing attack launched by any adversary without knowing any secret information of the victim users. In addition, their protocol fails to achieve the claimed user privacy protection. For handling these aforementioned shortcomings, we introduce a new biometric-based authentication scheme for multi-server architecture preserving user anonymity. Besides, Burrows—Abadi—Needham (BAN)-logic validated proof and discussion on possible attacks demonstrate the completeness and security of our scheme, respectively. Further, the comparisons in terms of security analysis and performance evaluation of several related protocols show that our proposal can provide stronger security without sacrificing efficiency.https://www.mdpi.com/1424-8220/19/14/3144authenticationanonymityBAN-logicbiometricsmultiple server |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Huawei Wang Dianli Guo Hua Zhang Qiaoyan Wen |
spellingShingle |
Huawei Wang Dianli Guo Hua Zhang Qiaoyan Wen Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity Sensors authentication anonymity BAN-logic biometrics multiple server |
author_facet |
Huawei Wang Dianli Guo Hua Zhang Qiaoyan Wen |
author_sort |
Huawei Wang |
title |
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity |
title_short |
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity |
title_full |
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity |
title_fullStr |
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity |
title_full_unstemmed |
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity |
title_sort |
robust multiple servers architecture based authentication scheme preserving anonymity |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2019-07-01 |
description |
Recently, many dynamic ID based remote user authentication schemes using smart card have been proposed to improve the security in multiple servers architecture authentication systems. In 2017, Kumari and Om proposed an anonymous multi-server authenticated key agreement scheme, which is believed to be secure against a range of network attacks. Nevertheless, in this paper we reanalyze the security of their scheme, and show that the scheme is vulnerable to impersonation attack and server spoofing attack launched by any adversary without knowing any secret information of the victim users. In addition, their protocol fails to achieve the claimed user privacy protection. For handling these aforementioned shortcomings, we introduce a new biometric-based authentication scheme for multi-server architecture preserving user anonymity. Besides, Burrows—Abadi—Needham (BAN)-logic validated proof and discussion on possible attacks demonstrate the completeness and security of our scheme, respectively. Further, the comparisons in terms of security analysis and performance evaluation of several related protocols show that our proposal can provide stronger security without sacrificing efficiency. |
topic |
authentication anonymity BAN-logic biometrics multiple server |
url |
https://www.mdpi.com/1424-8220/19/14/3144 |
work_keys_str_mv |
AT huaweiwang robustmultipleserversarchitecturebasedauthenticationschemepreservinganonymity AT dianliguo robustmultipleserversarchitecturebasedauthenticationschemepreservinganonymity AT huazhang robustmultipleserversarchitecturebasedauthenticationschemepreservinganonymity AT qiaoyanwen robustmultipleserversarchitecturebasedauthenticationschemepreservinganonymity |
_version_ |
1724806448888676352 |