| Literature DB >> 27163786 |
Alavalapati Goutham Reddy1, Ashok Kumar Das2, Vanga Odelu3, Kee-Young Yoo1.
Abstract
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.Entities:
Mesh:
Year: 2016 PMID: 27163786 PMCID: PMC4862638 DOI: 10.1371/journal.pone.0154308
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Notations of Lu et al.’s protocol.
| An user | |
| Authorized server | |
| Registration center | |
| Identity of | |
| Password of | |
| Biometrics of | |
| Private keys of | |
| A secure key chosen by | |
| A secure one-way hash function | |
| A bio-hash function | |
| ⊕ | An exclusive-OR operation |
| || | The concatenation operation |
Fig 1Registration phase of Lu et al.’s protocol.
Fig 2Login and authentication phases of Lu et al.’s protocol.
Notations of the proposed protocol.
| An | |
| Application server | |
| Registration server | |
| Identity of | |
| Password of | |
| A number chosen by | |
| Identity of | |
| A secure key chosen by | |
| A secure key chosen by | |
| Random numbers chosen by | |
| A secure one-way hash function | |
| A bio-hash function | |
| ⊕ | An exclusive-OR operation |
| || | The concatenation operation |
Fig 3User registration phase.
Fig 4Mutual authentication with key-agreement phase.
Fig 5Role specification for user U.
Fig 6Role specification for application server AS.
Fig 7Role specification for registration server RS.
Fig 8Role specification for the goal and environment.
Fig 9Role specification in HLPSL for the session.
Fig 10The result of the analysis using OFMC and CL-AtSe backends.
Comparison of security properties.
| Security property | Chuang [ | Mishra [ | Lin [ | Chen [ | Lu [ | Our |
|---|---|---|---|---|---|---|
| P1 | No | No | No | Yes | No | Yes |
| P2 | Yes | Yes | No | Yes | Yes | Yes |
| P3 | Yes | Yes | Yes | Yes | Yes | Yes |
| P4 | No | No | Yes | Yes | No | Yes |
| P5 | No | No | Yes | Yes | Yes | Yes |
| P6 | No | No | Yes | Yes | No | Yes |
| P7 | No | No | Yes | Yes | No | Yes |
| P8 | Yes | Yes | No | Yes | Yes | Yes |
| P9 | No | Yes | No | Yes | Yes | Yes |
| P10 | Yes | Yes | Yes | Yes | Yes | Yes |
| P11 | Yes | Yes | No | Yes | Yes | Yes |
| P12 | Yes | Yes | No | Yes | No | Yes |
| P13 | Yes | Yes | Yes | Yes | No | Yes |
P1: User anonymity and untraceability, P2: Perfect mutual authentication, P3: Prevent replay attack, P4: Prevent man-in-middle attack, P5: Prevent stolen smart card attack, P6: Prevent user impersonation attack, P7: Prevent server impersonation attack, P8: Prevent insider attack, P9: Prevent denial-of-service attack, P10: Prevent password guessing attack, P11: No user verification table, P12: Prevent clock synchronization problem, P13: Perfect forward secrecy
Comparison of computational cost.
| Phase | Chuang [ | Mishra [ | Lee [ | Lin [ | Chen [ | Lu [ | Our |
|---|---|---|---|---|---|---|---|
| Login | 3 | 7 | 2 | 5 | 3 | 5 | 5 |
| Authentication+key-agreement | 16 | 17 | 12 | 10 | 16 | 13 | 8 |
| Total | 19 | 24 | 14 | 15 | 19 | 18 | 13 |
Comparison of communication overhead.
| Feature | Chuang [ | Mishra [ | Lin [ | Chen [ | Lu [ | Our |
|---|---|---|---|---|---|---|
| Number of messages | 3 | 3 | 3 | 3 | 3 | 3 |
| Number of bits | 1280 | 1280 | 2528 | 1280 | 1216 | 960 |