A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication

被引:18
作者
Amin, Ruhul [1 ]
Islam, S. K. Hafizul [2 ]
Vijayakumar, Pandi [3 ]
Khan, Muhammad Khurram [4 ]
Chang, Victor [5 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, WB, India
[3] Univ Coll Engn, Dept Comp Sci & Engn, Tindivanam 604001, TN, India
[4] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[5] Xian Jiaotong Liverpool Univ, IBSS, Informat Management & Informat Syst, Suzhou, Jiangsu, Peoples R China
关键词
AVISPA tool; Bilinear pairing; User authentication; User anonymity; Password; USER AUTHENTICATION; PROVABLY SECURE; POWER ANALYSIS; SCHEME; PROTOCOL; NETWORKS; ACCESS;
D O I
10.1007/s11042-017-4996-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote mutual authentication provides an efficient platform through which an user accesses several resources of the remote serve at anytime over insecure channel and makes their life more comfortable. In this context, lot of key agreement methods have been put forward for enhancing securities. Preserving complete security requirements of the authentication scheme are now becoming challenging research. Hsu et al. proposed similar type of work using bilinear pairing for improving the security weaknesses of the Fang's scheme, and Das et al.'s scheme. We have studied Hsu et al.'s scheme and pointed out that the scheme is ill-suited since off-line password guessing and new smartcard issue attacks are possible in this scheme. It is our further study that Hsu et al.'s scheme is not preserving session key negotiation and mutual authentication. The same problems also exist in Fang's scheme and Das et al.'s scheme. The objective of this article is to provide an efficient scheme, which resolves all the existing problems. The AVISPA simulation results on our scheme ensured that active and passive attacks are protected. The informal security discussion claims that the scheme resists all kinds of security attacks. We have shown that the performance of our scheme is relatively superior in comparison with existing works. As an application area, anyone can execute our protocol in multimedia big data environment for making secure connection between the client and server.
引用
收藏
页码:11041 / 11066
页数:26
相关论文
共 47 条
[31]  
Islam SK Hafizul, 2013, Journal of Applied Mathematics and Informatics, V31, P425
[32]  
Jia ZT, 2006, ISDA 2006: SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, P1091
[33]   A model for secure multimedia document database system in a distributed environment [J].
Joshi, JBD ;
Li, ZK ;
Fahmi, H ;
Shafiq, B ;
Ghafoor, A .
IEEE TRANSACTIONS ON MULTIMEDIA, 2002, 4 (02) :215-234
[34]   Efficient password authenticated key agreement using bilinear pairings [J].
Juang, Wen-Shenq ;
Nien, Wei-Ken .
MATHEMATICAL AND COMPUTER MODELLING, 2008, 47 (11-12) :1238-1245
[35]   An Authentication Scheme for Secure Access to Healthcare Services [J].
Khan, Muhammad Khurram ;
Kumari, Saru .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (04)
[36]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[37]   REDUCING ELLIPTIC CURVE LOGARITHMS TO LOGARITHMS IN A FINITE-FIELD [J].
MENEZES, AJ ;
OKAMOTO, T ;
VANSTONE, SA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (05) :1639-1646
[38]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552
[39]   Robust Smart Card Authentication Scheme for Multi-server Architecture [J].
Pippal, Ravi Singh ;
Jaidhar, C. D. ;
Tapaswi, Shashikala .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (01) :729-745
[40]   A Framework for Composition and Enforcement of Privacy-Aware and Context-Driven Authorization Mechanism for Multimedia Big Data [J].
Samuel, Arjmand ;
Sarfraz, Muhammad I. ;
Haseeb, Hammad ;
Basalamah, Saleh ;
Ghafoor, Arif .
IEEE TRANSACTIONS ON MULTIMEDIA, 2015, 17 (09) :1484-1494