Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity release_lgkcmn6lyba67k3cyna4z5xyqi

by Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, Dongho Won

Published in Security and Communication Networks by Hindawi Limited.

2018   Volume 2018, p1-14

Abstract

At present, a number of users employ an authentication protocol so as to enjoy protected electronic transactions in wireless networks. In order to establish an efficient and robust the transaction system, numerous researches have been conducted relating to authentication protocols. Recently, Kaul and Awasthi presented an user authentication and key agreement scheme, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent two kinds of attacks, including off-line password guessing attacks and user impersonation attacks. Second, user anonymity rule cannot be upheld. Third, session key can be compromised by an attacker. Fourth, there is high possibility that the time synchronization trouble occurs. Therefore, we suggest an upgraded version of the user authenticated key agreement method that provides enhanced security. Our security and performance analysis shows that compared, to other associated protocols, our method not only improves the security level but also ensures efficiency.
In application/xml+jats format

Archived Files and Locations

application/pdf  3.1 MB
file_2mbm47ridfb2dnari6vtuwyeau
web.archive.org (webarchive)
downloads.hindawi.com (publisher)
Read Archived PDF
Preserved and Accessible
Type  article-journal
Stage   published
Date   2018-06-20
Language   en ?
Container Metadata
Open Access Publication
In DOAJ
In Keepers Registry
ISSN-L:  1939-0122
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: ee5d58ec-2a3e-46ae-b0f8-0829a2742cce
API URL: JSON