| Literature DB >> 29534085 |
Li Yang1,2, Zhiming Zheng1,2.
Abstract
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.Entities:
Mesh:
Year: 2018 PMID: 29534085 PMCID: PMC5849336 DOI: 10.1371/journal.pone.0194093
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1The mechanism of fuzzy extractor.
Symbols and corresponding notions in Wang et al.’s scheme.
| Symbol | Notion |
|---|---|
| Registration center | |
| User | |
| User | |
| User | |
| User | |
| User | |
| User | |
| User | |
| Server | |
| Pre shared key | |
| Master secret key | |
| Collision-resistant hash function | |
| ⊕ | XOR operation |
| || | Concatenation operation |
Symbols and corresponding notions in our scheme.
| Symbol | Notion |
|---|---|
| Registration center | |
| User | |
| User | |
| User | |
| User | |
| User | |
| User | |
| Server | |
| Pre shared key | |
| Master secret key | |
| Collision-resistant hash function | |
| ⊕ | XOR operation |
| || | Concatenation operation |
Fig 2The server registration phase.
Fig 3The user registration phase.
Fig 4The login phase.
Fig 5The authentication phase.
Algorithm .
| 01. Eavesdrop user |
| in which |
| 02. Apply this oracle |
| 03. Eavesdrop server |
| in which |
| 04. Apply this oracle |
| 05. |
| 06. Apply this oracle |
| 07. Further apply this oracle |
| 08. Calculate |
| 09. Further calculate |
| 10. |
| 11. Apply this oracle |
| 12. Further apply this oracle |
| 13. Calculate |
| 14. |
| 15. Accept |
| pre shared key |
| 16. |
| 17. |
| 18. |
| 19. |
| 20. |
| 21. |
| 22. |
| 23. |
| 24. |
| 25. |
Symbols and corresponding notions in the BAN logic.
| Symbol | Notion |
|---|---|
| Principal | |
|
| Principal |
| Principal | |
| # | Statement |
| Principal | |
| Principal | |
| { | Statement |
| ( | Statement |
| < | Statement |
The security comparison.
| Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ours | |
|---|---|---|---|---|---|---|---|
| R1 | No | Yes | Yes | Yes | Yes | Yes | Yes |
| R2 | No | Yes | Yes | No | Yes | Yes | Yes |
| R3 | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| R4 | No | Yes | Yes | Yes | Yes | Yes | Yes |
| R5 | No | No | No | Yes | Yes | Yes | Yes |
| R6 | No | Yes | No | Yes | Yes | Yes | Yes |
| R7 | No | No | No | Yes | Yes | Yes | Yes |
| R8 | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| R9 | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| R10 | No | No | Yes | Yes | Yes | Yes | Yes |
| R11 | No | Yes | No | No | Yes | Yes | Yes |
The functionality comparison.
| Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ours | |
|---|---|---|---|---|---|---|---|---|---|
| F1 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| F2 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| F3 | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| F4 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
The computational cost comparison.
| Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ours | |
|---|---|---|---|---|---|---|---|---|---|
| C1 | 7 | 3 | 4 | 5 | 4 | 4 | 6 | 9 | 5 |
| C2 | 0.0161 ms | 2.2421 ms | 0.0092 ms | 0.0115 ms | 0.0138 ms | 0.0182 ms | 2.2398 ms | 0.0207 ms | 0.0115 ms |
| C3 | 11 | 5 | 11 | 7 | 8 | 6 | 9 | 12 | 13 |
| C4 | 0.0253 ms | 6.7033 ms | 0.0253 ms | 0.0253 ms | 0.0230 ms | 0.0318 ms | 6.6987 ms | 0.0368 ms | 0.0299 ms |
| C5 | 0.0414 ms | 8.9454 ms | 0.0345 ms | 0.0368 ms | 0.0368 ms | 0.0500 ms | 8.9385 ms | 0.0575 ms | 0.0414 ms |
Fig 6The computation cost comparison.
The communication overhead and storage requirement comparison.
| Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ours | |
|---|---|---|---|---|---|---|---|---|---|
| S1 | 80 bytes | 80 bytes | 102 bytes | 62 bytes | 40 bytes | 62 bytes | 80 bytes | 60 bytes | 102 bytes |
| S2 | 80 bytes | 80 bytes | 80 bytes | 62 bytes | 60 bytes | 40 bytes | 80 bytes | 80 bytes | 60 bytes |
| S3 | 160 bytes | 160 bytes | 182 bytes | 124 bytes | 100 bytes | 102 bytes | 160 bytes | 140 bytes | 162 bytes |
| S4 | 100 bytes | 80 bytes | 100 bytes | 100 bytes | 60 bytes | 100 bytes | 100 bytes | 100 bytes | 100 bytes |
Fig 7The communication overhead and storage requirement comparison.