Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 281305, 15 pages
http://dx.doi.org/10.1155/2014/281305
Research Article

Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

1Department of Computer Engineering, Sungkyunkwan University, 2066 Seoburo, Suwon, Gyeonggido 440-746, Republic of Korea
2Department of Computer Engineering, Konkuk University, 268 Chungwondaero, Chungju, Chungcheongbukdo 380-701, Republic of Korea

Received 14 March 2014; Revised 28 July 2014; Accepted 29 July 2014; Published 8 September 2014

Academic Editor: Fei Yu

Copyright © 2014 Younsung Choi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. P. Liao and S. S. Wang, “A secure dynamic ID based remote user authentication scheme for multi-server environment,” Computer Standards and Interfaces, vol. 31, no. 1, pp. 24–29, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, 1981. View at Publisher · View at Google Scholar · View at Scopus
  3. P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Advances in Cryptology—CRYPTO '99, Lecture Notes in Computer Science, pp. 388–397, Springer, Berlin, Germany, 1999. View at Google Scholar
  4. T. S. Messerges, E. A. Dabbish, and R. . . Sloan, “Examining smart-card security under the threat of power analysis attacks,” IEEE Transactions on Computers, vol. 51, no. 5, pp. 541–552, 2002. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. C. C. Chang and J. S. Lee, “An efficient and secure multi-server password authentication scheme using smart cards,” Computer Communications, vol. 32, no. 4, pp. 611–618, 2009. View at Publisher · View at Google Scholar
  6. M. K. Khan and J. Zhang, “An efficient and practical fingerprint-based remote user authentication scheme with smart cards,” in Information Security Practice and Experience 2006, pp. 260–268, Springer, Berlin, Germany, 2006. View at Google Scholar
  7. W. C. Ku, S. T. Chang, and M. H. Chiang, “Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards,” Electronics Letters, vol. 41, no. 5, pp. 240–241, 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. C.-T. Li and M.-S. Hwang, “An efficient biometrics-based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Li, J. W. Niu, J. Ma, W. D. Wang, and C. L. Liu, “Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 73–79, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. D. Yang and B. Yang, “A biometric password-based multi-server authentication scheme with smart card,” in Proceedings of the International Conference on Computer Design and Applications (ICCDA '10), vol. 5, pp. 554–559, Qinhuangdao, China, June 2010. View at Publisher · View at Google Scholar
  11. E.-J. Yoon and K.-Y. Yoo, “Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem,” The Journal of Supercomputing, vol. 63, no. 1, pp. 235–255, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. D. He, “Security flaws in a biometrics-based multi-server authentication with key agreement scheme,” IACR Cryptology ePrint Archive, vol. 365, 2011. View at Google Scholar
  13. M. C. Chuang and M. C. Chen, “An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics,” Expert Systems with Applications, vol. 41, no. 4, pp. 1411–1418, 2014. View at Google Scholar
  14. W. J. Tsaur, “A flexible user authentication scheme for multi-server internet services,” in Networking—ICN 2001, pp. 174–183, Springer, Berlin, Germany, 2001. View at Google Scholar
  15. L. Li, I. Lin, and M. Hwang, “A remote password authentication scheme for multiserver architecture using neural networks,” IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498–1504, 2001. View at Publisher · View at Google Scholar · View at Scopus
  16. I. C. Lin, M. S. Hwang, and L. H. Li, “A new remote user authentication scheme for multi-server architecture,” Future Generation Computer Systems, vol. 19, no. 1, pp. 13–22, 2003. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Kim, D. Lee, W. Jeon, Y. Lee, and D. Won, “Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks,” Sensors, vol. 14, pp. 6443–6462, 2014. View at Publisher · View at Google Scholar
  18. J. Nam, J. Paik, and D. Won, “Security improvement on Wu and Zhu's protocol for password-authenticated group key exchange,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E94-A, no. 2, pp. 865–868, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. W. Tsaur, C. Wu, and W. Lee, “An enhanced user authentication scheme for multi-server internet services,” Applied Mathematics and Computation, vol. 170, no. 1, pp. 258–266, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  20. T. Wu and C. Hsu, “Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks,” Computers and Security, vol. 23, no. 2, pp. 120–125, 2004. View at Publisher · View at Google Scholar · View at Scopus
  21. W. S. Juang, “Efficient multi-server password authenticated key agreement using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 251–255, 2004. View at Publisher · View at Google Scholar · View at Scopus
  22. J. Nam, K. K. R. Choo, J. Kim, H. K. Kang, J. Paik, and D. Won, “Password-only authenticated three-party key exchange with provable security in the standard model,” The Scientific World Journal, vol. 2014, Article ID 825072, 11 pages, 2014. View at Publisher · View at Google Scholar
  23. Y. Choi, D. Lee, J. Kim, J. Jung, J. Nam, and D. Won, “Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography,” Sensors, vol. 14, pp. 10081–10106, 2014. View at Google Scholar
  24. W. Jeon, J. Kim, J. Nam, Y. Lee, and D. Won, “An enhanced secure authentication scheme with anonymity for wireless environments,” IEICE Transactions on Communications, vol. 95, no. 7, pp. 2505–2508, 2012. View at Publisher · View at Google Scholar · View at Scopus