| Literature DB >> 22899887 |
Abstract
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.Entities:
Mesh:
Year: 2012 PMID: 22899887 PMCID: PMC3415263 DOI: 10.1155/2012/519723
Source DB: PubMed Journal: J Biomed Biotechnol ISSN: 1110-7243
Notations used in this paper.
| Notation | Description |
|---|---|
|
| User |
|
| Trusted registration centre |
|
| Server |
|
| Attacker |
| PW | Password of the user |
| ID | Identity of the user |
|
| Biometric template of the user |
|
| A secure hash function |
|
| A secret information maintained by the server |
|
|
|
|
| Exclusive-OR operation of |
Figure 1User impersonation attack and server masquerading attack.
Figure 2Registration phase of the enhanced scheme.
Figure 3Login phase and authentication phase of the enhanced scheme.
Security comparison of the related scheme and the enhanced scheme.
| Security features | Li-Hwang's scheme [ | Das's scheme [ | Enhanced scheme |
|---|---|---|---|
| User impersonation attack | Possible | Possible | Impossible |
| Sever masquerading attack | Possible | Possible | Impossible |
| Password guessing attack | Possible | Possible | Impossible |
| Insider attack | Possible | Possible | Impossible |
| Mutual authentication | Not provided | Not provided | Provided |