Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps

With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. To preserve the security of those messages transmitted over the public channel, remote user authentication pr...

Full description

Saved in:
Bibliographic Details
Main Authors: Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu
Format: Article
Language:English
Published: Wiley 2019-04-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147719842152
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832555302505938944
author Yan Zhao
Shiming Li
Liehui Jiang
Tieming Liu
author_facet Yan Zhao
Shiming Li
Liehui Jiang
Tieming Liu
author_sort Yan Zhao
collection DOAJ
description With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. To preserve the security of those messages transmitted over the public channel, remote user authentication protocols are popularly implemented in various information systems. Recently, Park et al. pointed that Cao and Ge’s three-factor authentication scheme suffers from offline identity guessing attack and server impersonation attack. They also proposed a new scheme after presenting the corresponding cryptanalysis. However, we found that Park et al.’s scheme is vulnerable to offline password guessing attack, which is the most serious threat against this kind of authentication scheme. In addition, their scheme cannot provide complete correctness due to the misuse of bio-hashing and also fails to achieve user untraceability and perfect forward secrecy. To conquer these security pitfalls, we put forward a password, smart card, and biometrics-based three-factor remote user authentication scheme using the extended Chebyshev chaotic maps. The security analysis indicates that the proposed scheme can withstand various well-known attacks including offline guessing attack, impersonation attack, and so on. The performance evaluation shows that the proposed scheme provides stronger security guarantee at the cost of acceptable computation overhead. Thus, the proposed scheme is more desirable for securing communication in mobile networks.
format Article
id doaj-art-1cc799295eeb484995d84374dedce500
institution Kabale University
issn 1550-1477
language English
publishDate 2019-04-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-1cc799295eeb484995d84374dedce5002025-02-03T05:48:34ZengWileyInternational Journal of Distributed Sensor Networks1550-14772019-04-011510.1177/1550147719842152Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic mapsYan Zhao0Shiming Li1Liehui Jiang2Tieming Liu3School of Physics and Electronic Information, Luoyang Normal University, Luoyang, ChinaSchool of Computer Science and Information Engineering, Harbin Normal University, Harbin, ChinaState Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, ChinaState Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, ChinaWith the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. To preserve the security of those messages transmitted over the public channel, remote user authentication protocols are popularly implemented in various information systems. Recently, Park et al. pointed that Cao and Ge’s three-factor authentication scheme suffers from offline identity guessing attack and server impersonation attack. They also proposed a new scheme after presenting the corresponding cryptanalysis. However, we found that Park et al.’s scheme is vulnerable to offline password guessing attack, which is the most serious threat against this kind of authentication scheme. In addition, their scheme cannot provide complete correctness due to the misuse of bio-hashing and also fails to achieve user untraceability and perfect forward secrecy. To conquer these security pitfalls, we put forward a password, smart card, and biometrics-based three-factor remote user authentication scheme using the extended Chebyshev chaotic maps. The security analysis indicates that the proposed scheme can withstand various well-known attacks including offline guessing attack, impersonation attack, and so on. The performance evaluation shows that the proposed scheme provides stronger security guarantee at the cost of acceptable computation overhead. Thus, the proposed scheme is more desirable for securing communication in mobile networks.https://doi.org/10.1177/1550147719842152
spellingShingle Yan Zhao
Shiming Li
Liehui Jiang
Tieming Liu
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
International Journal of Distributed Sensor Networks
title Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
title_full Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
title_fullStr Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
title_full_unstemmed Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
title_short Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
title_sort security enhanced three factor remote user authentication scheme based on chebyshev chaotic maps
url https://doi.org/10.1177/1550147719842152
work_keys_str_mv AT yanzhao securityenhancedthreefactorremoteuserauthenticationschemebasedonchebyshevchaoticmaps
AT shimingli securityenhancedthreefactorremoteuserauthenticationschemebasedonchebyshevchaoticmaps
AT liehuijiang securityenhancedthreefactorremoteuserauthenticationschemebasedonchebyshevchaoticmaps
AT tiemingliu securityenhancedthreefactorremoteuserauthenticationschemebasedonchebyshevchaoticmaps