Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. To preserve the security of those messages transmitted over the public channel, remote user authentication pr...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2019-04-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147719842152 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832555302505938944 |
---|---|
author | Yan Zhao Shiming Li Liehui Jiang Tieming Liu |
author_facet | Yan Zhao Shiming Li Liehui Jiang Tieming Liu |
author_sort | Yan Zhao |
collection | DOAJ |
description | With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. To preserve the security of those messages transmitted over the public channel, remote user authentication protocols are popularly implemented in various information systems. Recently, Park et al. pointed that Cao and Ge’s three-factor authentication scheme suffers from offline identity guessing attack and server impersonation attack. They also proposed a new scheme after presenting the corresponding cryptanalysis. However, we found that Park et al.’s scheme is vulnerable to offline password guessing attack, which is the most serious threat against this kind of authentication scheme. In addition, their scheme cannot provide complete correctness due to the misuse of bio-hashing and also fails to achieve user untraceability and perfect forward secrecy. To conquer these security pitfalls, we put forward a password, smart card, and biometrics-based three-factor remote user authentication scheme using the extended Chebyshev chaotic maps. The security analysis indicates that the proposed scheme can withstand various well-known attacks including offline guessing attack, impersonation attack, and so on. The performance evaluation shows that the proposed scheme provides stronger security guarantee at the cost of acceptable computation overhead. Thus, the proposed scheme is more desirable for securing communication in mobile networks. |
format | Article |
id | doaj-art-1cc799295eeb484995d84374dedce500 |
institution | Kabale University |
issn | 1550-1477 |
language | English |
publishDate | 2019-04-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj-art-1cc799295eeb484995d84374dedce5002025-02-03T05:48:34ZengWileyInternational Journal of Distributed Sensor Networks1550-14772019-04-011510.1177/1550147719842152Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic mapsYan Zhao0Shiming Li1Liehui Jiang2Tieming Liu3School of Physics and Electronic Information, Luoyang Normal University, Luoyang, ChinaSchool of Computer Science and Information Engineering, Harbin Normal University, Harbin, ChinaState Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, ChinaState Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, ChinaWith the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. To preserve the security of those messages transmitted over the public channel, remote user authentication protocols are popularly implemented in various information systems. Recently, Park et al. pointed that Cao and Ge’s three-factor authentication scheme suffers from offline identity guessing attack and server impersonation attack. They also proposed a new scheme after presenting the corresponding cryptanalysis. However, we found that Park et al.’s scheme is vulnerable to offline password guessing attack, which is the most serious threat against this kind of authentication scheme. In addition, their scheme cannot provide complete correctness due to the misuse of bio-hashing and also fails to achieve user untraceability and perfect forward secrecy. To conquer these security pitfalls, we put forward a password, smart card, and biometrics-based three-factor remote user authentication scheme using the extended Chebyshev chaotic maps. The security analysis indicates that the proposed scheme can withstand various well-known attacks including offline guessing attack, impersonation attack, and so on. The performance evaluation shows that the proposed scheme provides stronger security guarantee at the cost of acceptable computation overhead. Thus, the proposed scheme is more desirable for securing communication in mobile networks.https://doi.org/10.1177/1550147719842152 |
spellingShingle | Yan Zhao Shiming Li Liehui Jiang Tieming Liu Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps International Journal of Distributed Sensor Networks |
title | Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps |
title_full | Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps |
title_fullStr | Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps |
title_full_unstemmed | Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps |
title_short | Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps |
title_sort | security enhanced three factor remote user authentication scheme based on chebyshev chaotic maps |
url | https://doi.org/10.1177/1550147719842152 |
work_keys_str_mv | AT yanzhao securityenhancedthreefactorremoteuserauthenticationschemebasedonchebyshevchaoticmaps AT shimingli securityenhancedthreefactorremoteuserauthenticationschemebasedonchebyshevchaoticmaps AT liehuijiang securityenhancedthreefactorremoteuserauthenticationschemebasedonchebyshevchaoticmaps AT tiemingliu securityenhancedthreefactorremoteuserauthenticationschemebasedonchebyshevchaoticmaps |