Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 1378128, 13 pages
https://doi.org/10.1155/2017/1378128
Research Article

Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

1Department of Electrical and Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si, Gyeonggi-do 16419, Republic of Korea
2Department of Cyber Security, Howon University, 64 Howondae 3-gil, Impi-myeon, Gunsan-si, Jeonrabuk-do 54058, Republic of Korea
3Department of Mobile Internet, Daelim University College, 29 Imgok-ro, Dongan-gu, Anyang-si, Gyeonggi-do 13916, Republic of Korea
4Department of Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si, Gyeonggi-do 16419, Republic of Korea

Correspondence should be addressed to Dongho Won; rk.er.ytiruces@nowhd

Received 4 May 2017; Accepted 16 August 2017; Published 27 September 2017

Academic Editor: Hongxin Hu

Copyright © 2017 Jongho Moon et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Park, H. W. Kim, S. Kim, and D. Won, “Open location-based service using secure middleware infrastructure in web services,” in Proceedings of the International Conference on Computational Science and Its Applications - ICCSA 2005, pp. 1146–1155, sgp, May 2005. View at Scopus
  2. L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, 1981. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Kumar, “On the weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards,” IACR Cryptology ePrint Archive, pp. 163–174, 2004. View at Google Scholar
  4. H. Lin, “Efficient mobile dynamic ID authentication and key agreement scheme without trusted servers,” International Journal of Communication Systems, vol. 30, no. 1, Article ID e2818, 2017. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Khan and J. Zhang, “Improving the security of “a flexible biometrics remote user authentication scheme”,” Computer Standards and Interfaces, vol. 29, no. 1, pp. 82–85, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. W. Jeon, J. Kim, J. Nam, Y. Lee, and D. Won, “An enhanced secure authentication scheme with anonymity for wireless environments,” IEICE Transactions on Communications, vol. 95, no. 7, pp. 2505–2508, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. D. He, N. Kumar, M. K. Khan, and J.-H. Lee, “Anonymous two-factor authentication for consumer roaming service in global mobility networks,” IEEE Transactions on Consumer Electronics, vol. 59, no. 4, pp. 811–817, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. D. Mishra, A. Das, and S. Mukhopadhyay, “A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards,” Expert Systems with Applications, vol. 41, no. 18, pp. 8129–8143, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Amin, S. Islam, G. Biswas, M. Khan, and N. Kumar, “A robust and anonymous patient monitoring system using wireless medical sensor networks,” Future Generation Computer Systems, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. R. Amin, R. Sherratt, D. Giri, S. Islam, and M. Khan, “A software agent enabled biometric security algorithm for secure file access in consumer storage devices,” IEEE Transactions on Consumer Electronics, vol. 63, no. 1, pp. 53–61, 2017. View at Publisher · View at Google Scholar
  11. P. Mohit, R. Amin, and G. Biswas, “Design of authentication protocol for wireless sensor network-based smart vehicular system,” Vehicular Communications, vol. 9, pp. 64–71, 2017. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Chaturvedi, D. Mishra, S. Jangirala, and S. Mukhopadhyay, “A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme,” Journal of Information Security and Applications, vol. 32, pp. 15–26, 2017. View at Publisher · View at Google Scholar · View at Scopus
  13. D. Mishra, S. Kumari, M. Khan, and S. Mukhopadhyay, “An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems,” International Journal of Communication Systems, vol. 30, no. 1, Article ID e2946, 2017. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Park, S. Kim, and D. Won, “ID-based group signature,” Electronics Letters, vol. 33, no. 19, pp. 1616-1617, 1997. View at Publisher · View at Google Scholar · View at Scopus
  15. R. Amin and G. Biswas, “An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS,” Journal of Medical Systems, vol. 39, no. 8, article no. 79, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Nam, M. Kim, J. Paik, Y. Lee, and D. Won, “A provably-secure ECC-based authentication scheme for wireless sensor networks,” Sensors, vol. 14, no. 11, pp. 21023–21044, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. R. Amin, S. Islam, G. Biswas, M. Khan, and N. Kumar, “An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography,” Journal of Medical Systems, vol. 39, no. 11, article no. 180, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Chen, D. He, S. Chan, J. Bu, Y. Gao, and R. Fan, “Lightweight and provably secure user authentication with anonymity for the global mobility network,” International Journal of Communication Systems, vol. 24, no. 3, pp. 347–362, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Debiao, C. Jianhua, and Z. Rui, “A more secure authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 3, pp. 1989–1995, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. S. Wu, Y. Zhu, and Q. Pu, “Robust smart-cards-based user authentication scheme with user anonymity,” Security and Communication Networks, vol. 5, no. 2, pp. 236–248, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. P. Gong, P. Li, and W. Shi, “A secure chaotic maps-based key agreement protocol without using smart cards,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 70, no. 4, pp. 2401–2406, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. J. Moon, Y. Choi, J. Kim, and D. Won, “An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps,” Journal of Medical Systems, vol. 40, no. 3, article no. 70, pp. 1–11, 2016. View at Publisher · View at Google Scholar · View at Scopus
  23. D. Xiao, X. Liao, and S. Deng, “A novel key agreement protocol based on chaotic maps,” Information Sciences. An International Journal, vol. 177, no. 4, pp. 1136–1142, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. S. Han, H. Tseng, R. Jan, and W. Yang, “A chaotic maps-based key agreement protocol that preserves user anonymity,” in Proceedings of the IEEE International Conference on Communications (ICCâ09, pp. 1–6, Dresden, Germany, 2009.
  25. C. Lee, C. Chen, C. Wu, and S. Huang, “An extended chaotic maps-based key agreement protocol with user anonymity,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 69, no. 1-2, pp. 79–87, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  26. H. Lin, “Chaotic map based mobile dynamic ID authenticated key agreement scheme,” Wireless Personal Communications, vol. 78, no. 2, pp. 1487–1494, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Islam, M. Obaidat, and R. Amin, “An anonymous and provably secure authentication scheme for mobile user,” International Journal of Communication Systems, vol. 29, no. 9, pp. 1529–1544, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. C. Lee and C. Hsu, “A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 71, no. 1-2, pp. 200–211, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  29. D. He, Y. Chen, and J. Chen, “Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 69, no. 3, pp. 1149–1157, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. D. Guo, Q. Wen, W. Li, H. Zhang, and Z. Jin, “Analysis and Improvement of ‘Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme’,” Wireless Personal Communications, vol. 83, no. 1, pp. 35–48, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. S. Han, “Security of a key agreement protocol based on chaotic maps,” Chaos, Solitons & Fractals, vol. 38, no. 3, pp. 764–768, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  32. Y. Niu and X. Wang, “An anonymous key agreement protocol based on chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 4, pp. 1986–1992, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  33. E. Yoon, “Efficiency and security problems of anonymous key agreement protocol based on chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 7, pp. 2735–2740, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  34. K. Xue and P. Hong, “Security improvement of an anonymous key agreement protocol based on chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 7, pp. 2969–2977, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  35. Z. Tan, “A chaotic maps-based authenticated key agreement protocol with strong anonymity,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 72, no. 1-2, pp. 311–320, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  36. C. Li, C. Lee, and C. Weng, “An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 74, no. 4, pp. 1133–1143, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  37. D. Dolev and A. Yao, “On the security of public key protocols,” Institute of Electrical and Electronics Engineers. Transactions on Information Theory, vol. 29, no. 2, pp. 198–208, 1983. View at Publisher · View at Google Scholar · View at MathSciNet
  38. J. Moon, Y. Choi, J. Jung, and D. Won, “An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards,” PLoS ONE, vol. 10, no. 12, Article ID e0145263, 2015. View at Publisher · View at Google Scholar · View at Scopus
  39. Y. Dodis, B. Kanukurthi, J. Katz, and A. Smith, “Robust fuzzy extractors and authenticated key agreement from close secrets,” IEEE Transactions on Information Theory, vol. 58, no. 9, pp. 6207–6222, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  40. A. Das, “A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor,” International Journal of Communication Systems, vol. 30, no. 1, Article ID e2933, 2017. View at Publisher · View at Google Scholar · View at Scopus
  41. C. Wang, X. Zhang, and Z. Zheng, “Cryptanalysis and improvement of a biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor,” in PLoS One, vol. 11, pp. 25–25, 2016. View at Google Scholar
  42. Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,” in Advances in cryptology---{EUROCRYPT} 2004, vol. 3027 of Lecture Notes in Comput. Sci., pp. 523–540, Springer, Berlin, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  43. P. Bergamo, P. D'Arco, A. De Santis, and L. Kocarev, “Security of public-key cryptosystems based on Chebyshev polynomials,” IEEE Transactions on Circuits and Systems. I. Regular Papers, vol. 52, no. 7, pp. 1382–1393, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  44. A. Das, “A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communication,” in Networking Science, vol. 2, pp. 12–27, 2, 2013. View at Google Scholar
  45. Y. Lu, L. Li, X. Yang, and Y. Yang, “Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards,” PLoS ONE, vol. 10, no. 5, Article ID 0126323, 2015. View at Publisher · View at Google Scholar · View at Scopus
  46. von Oheimb D. The high-level protocol specification language hlpsl developed in the eu project avispa. In Proceedings of the Applied Semantics 2005 Workshop, Frauenchiemsee, Germany, 12–15 September 2005; pp. 1–17.
  47. M. Wazid, A. K. Das, S. Kumari, X. Li, and F. Wu, “Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS,” Security and Communication Networks, vol. 9, no. 13, pp. 1983–2001, 2016. View at Publisher · View at Google Scholar · View at Scopus
  48. H. Kilinc and T. Yanik, “A survey of SIP authentication and key agreement schemes,” IEEE Communications Surveys and Tutorials, vol. 16, no. 2, pp. 1005–1023, 2014. View at Publisher · View at Google Scholar · View at Scopus
  49. Lynn B. Pairing-based cryptography library, available at http://crypto.stanford.edu/pbc/.