Research Article

Efficient Hierarchical Authentication Protocol for Multiserver Architecture

Table 1

Related work summaries.

ProtocolTechniqueAdvantageDisadvantage

[1]Identity-basedLightweight and efficientCannot provide user anonymity
[4]Identity-basedProvides user anonymity, resists server spoofing attack and impersonation attack, etc.Cannot resist server spoofing attack and impersonation attacks
[5]Biometrics-basedFirst truly three-factor authenticated schemeCannot resist known session-specific temporary attack and the impersonation attack
[6]Biometrics-basedProvides secure authentication and resists passive and active attacksNeeds registration center online for authentication
[7]Identity-basedSecurity enhanced and supports smart card revocation and password update without centralized storageCannot resist the lost smart card attack and the offline dictionary guessing attack
[8]Biometrics-basedEfficient in terms of computation cost, communication cost, and resists smart card storage costHigh maintenance cost
[9]Biometrics-basedIncurs low overhead, suitable for deployment at mobile devicesNeeds registration center online for authentication
[10]Two-factor-basedSecurity enhanced, lightweight, and efficientNeeds registration center online for authentication
[11]Identity-basedResists the server spoofing attackNeeds registration center online for authentication
[12]Identity-basedDoes not need registration center online for authenticationCannot provide hierarchical authentication
[13]Identity-basedProvides black/white list-free and simple revocation mechanismCannot provide credentials privacy and untraceability
[14]Identity-basedProvides SK-security and strong credentials’ privacyCannot provide hierarchical authentication
[15]Identity-basedUses the self-certified public key cryptography and has lower computation and communication costsCannot provide hierarchical authentication
[16]Two-factor-basedResists server spoofing attack, desynchronization attack, and denial-of-service attackCannot provide hierarchical authentication
[17]Two-factor-basedReduces authentication processing time required by communication and computation between cloud service providers and traditional trusted third-party serviceCannot resist service provider impersonation attack and has no user revocation facility
[18]Biometrics-basedProvides three-factor security, user revocation, and reregistrationCannot provide hierarchical authentication
[19]Biometrics-basedUser anonymity, perfect forward secrecy, and resistance to desynchronization attackCannot provide hierarchical authentication
[21]Two-factor-basedProvides user untraceability and perfect forward securityCannot provide hierarchical authentication
[23]Biometric-basedUses chaotic map to improve efficiencyCannot provide hierarchical authentication