| Literature DB >> 30041475 |
Guosheng Xu1, Shuming Qiu2,3, Haseeb Ahmad4, Guoai Xu5, Yanhui Guo6, Miao Zhang7, Hong Xu8.
Abstract
To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in multi-server environments, Internet of Things (IoT), wireless sensor networks (WSNs), etc. This scheme enables users and servers to negotiate for a common session initiation key. Our proposal first analyzes Amin et al.'s authentication scheme based on RSA and proves that it cannot provide perfect forward secrecy and user un-traceability, and is susceptible to offline password guessing attack and key-compromise user impersonation attack. Secondly, we provide that Srinivas et al.'s multi-server authentication scheme is not secured against offline password guessing attack and key-compromise user impersonation attack, and is unable to ensure user un-traceability. To remedy such limitations and improve computational efficiency, we present a multi-server two-factor authentication scheme using elliptic curve cryptography (ECC). Subsequently, employing heuristic analysis and Burrows⁻Abadi⁻Needham logic (BAN-Logic) proof, it is proven that the presented scheme provides security against all known attacks, and in particular provides user un-traceability and perfect forward security. Finally, appropriate comparisons with prevalent works demonstrate the robustness and feasibility of the presented solution in multi-server environments.Entities:
Keywords: BAN-Logic; authentication; elliptic curve cryptography (ECC); key agreement; multi-server; wireless sensor networks (WSNs)
Year: 2018 PMID: 30041475 PMCID: PMC6068574 DOI: 10.3390/s18072394
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The architecture of the multi-server authentication system.
Notations and their descriptions.
| Symbol | Description | Symbol | Description |
|---|---|---|---|
|
| Registration center |
| Server |
|
| User |
| Smart card of |
|
| Identification of user |
| Password belonging to user |
|
| Random numbers of |
| Large prime |
|
| Public key of |
| Private key of |
|
| Random number of | ⊕ | The bitwise XOR operation |
|
| The string concatenation operation |
| One-way hash function |
|
| The malicious adversary |
| Session key belonging to |
Figure 2Server registration.
Figure 3User registration.
Figure 4Login and authentication.
Burrows–Abadi–Needham logic (BAN-Logic) notations.
| Symbol | Description |
|---|---|
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| use |
|
|
Basic BAN-Logic postulates
| Rule | Description |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The performing time of cryptographic operations (adapted from [53,54]).
| Symbol |
|
|
|
|
|---|---|---|---|---|
| Time |
Comparison of security features.
| Schemes | Awasthi et al. [ | Huang et al. [ | Amin et al. [ | Pippal et al. [ | Li et al. [ | Srinivas et al. [ | Proposed Scheme | |
|---|---|---|---|---|---|---|---|---|
| Features | ||||||||
|
| No | No | No | No | No | No | Yes | |
|
| No | No | No | No | No | No | Yes | |
|
| No | No | No | No | No | No | Yes | |
|
| No | No | Yes | No | No | Yes | Yes | |
|
| No | No | No | No | No | No | Yes | |
|
| No | Yes | Yes | No | No | Yes | Yes | |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | |
|
| N/A | N/A | Yes | Yes | Yes | Yes | Yes | |
|
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | |
|
| No | Yes | Yes | No | No | Yes | Yes | |
|
| No | No | Yes | No | No | Yes | Yes | |
|
| N/A | N/A | No | Yes | Yes | Yes | Yes | |
provides user anonymity and un-traceability. resists stolen smart-card attack. resists offline password guessing attack. resists privileged insider attack. resists (key-compromised) user impersonation attack. resists server-impersonation attack. resists replay attack. provides known key security. provides mutual authentication. resists man-in-the-middle attack. resists denial-of-service attack. provides perfect forward secrecy.
Comparison of computational complexity.
| Cost | User Computation | Server Computation | Total | |
|---|---|---|---|---|
| Schemes | ||||
| Awasthi et al. [ |
|
| ||
| Huang et al. [ |
|
| ||
| Amin et al. [ |
|
| ||
| Pippal et al. [ |
|
| ||
| Li et al. [ |
|
| ||
| Srinivas et al. [ |
|
| ||
| Proposed scheme |
|
| ||