Abstract
In a multi-server authentication environment, a user only needs to register once at a central registration place before accessing the different services on the different registered servers. Both, from a user point of view as for the management and maintenance of the infrastructure, these types of environments become more and more popular. Smartcard- or smartphone-based approaches lead to more secure systems because they offer two- or three-factor authentication, based on the strict combination of the user’s password, the user’s biometrics and the possession of the device. In this paper, we propose an efficient anonymous authentication protocol in multiple server communication networks, called the EAAM protocol, which is able to establish user anonymity, mutual authentication, and resistance against known security attacks. The novelty of the proposed scheme is that it does not require a secure channel during the registration between the user and the registration center and is resistant to a curious but honest registration system. These features are established in a highly efficient way with the minimum amount of communication flows between user and server during the establishment of the secret shared key and by using light-weight cryptographic techniques such as Chebyshev chaotic map techniques and symmetric key cryptography. The performance and security of the protocol are analyzed and compared with the latest new proposals in this field.
Similar content being viewed by others
References
Hwang M, Li L (2000) A new remote user authentications scheme using smart cards. IEEE Trans Consum Electron 46(1):28–30
He D, Zeadally S, Wang H, Liu Q (2017) Lightweight data aggregation scheme against internal attackers in smart grid using elliptic curve cryptography. Wirel Commun Mob Comput 2017:11
Li L, Peng H, Kurths J, Yang Y, Schellnhuber HJ (2014) Chaos-order transition in foraging behavior of ants. PNAS 111(23):8392–8397
Tashi J (2014) J., Comparative analysis of smart card authentication schemes. IOSR J Comput Eng 16(1):91–97
Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390–1397
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of EUROCRYPT, pp 523–540
Banerjee S, Dutta MP, Bhunia CT (2015) An Improved smart card based anonymous multi-server remote user authentication scheme. Int J Smart Home 9(5):11–22
Baruah KCH, Banerjee S, Dutta MP, Bhunia CT (2015) An improved biometric-based multi-server authentication scheme using smart card. Int J Secur Appl 9(1):397–408
Li CT, Hwang MS (2010) An efficient biometrics based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5
Chuang MC, Chen MC (2014) An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst Appl 41(4):1411–1418
Mishra D, Das AK, Mukhopadhyay S (2014) A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst Appl 41(18):8129–8143
Das AK (2011) Analysis and improvement on an efficient biometric based remote user authentication scheme using smart cards. IET Inf Secur 5(3):145–151
An Y (2012) Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. J Biomed Biotechnol 2012:6
Khan MK, Kumari S (2013) An improved biometrics-based remote authentication scheme with user anonymity. J Biomed Biotechnol 9
Wen F, Susilo W, Yang G (2015) Analysis and improvement on a biometric-based user authentication scheme using smart cards. Wireless Pers Commun 80:1747–1760
Braeken A, Porambage P (2015) Efficient anonym smart card based authentication scheme for multi-server. Architecture 9(9):177–184
Pippal RS, Wu S (2013) Robust smart card authentication scheme for multi-server architecture. Wireless Pers Commun 72(1):729–745
Wei J, Liu W, Hu X (2014) Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Pers Commun 77(1):2255–2269
Lin H, Wen F, Du C (2015) A novel and anonymous key agreement multi-server architecture. J Comput Inf Syst 11(8):3011–3018
Yoon E, Yoo K (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63(1):235–255
Kim H, Jeon W, Lee K, Lee Y, Won D (2012) Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. In: Proceedings of 12th International Conference on Computational Science and its Applications (ICCSA 2012), Salvador de Bahia, pp 391–406
He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823
Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multiserver authentication protocol using smart cards. IEEE Trans Inf Forensics Secur 10(9):1953–1966
Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72:1–24
Jiang Q, Ma J, Li G, Yang L (2014) An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wireless Pers Commun 77(2):1489–1506
Liao YP, Hsiao CM (2013) A novel multi-server remote user authentication scheme using selfcertified public keys for mobile clients. Future Gener Comput Syst 29(3):886–900
Amin R, Biswas GP (2016) Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel Pers Commun 84(1):439–462
Guo C, Chang C-C (2013) Chaotic maps-based password authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 18(6):1433–1440
Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map based authentication scheme for telecare medicine information systems. J Med Syst 37(2):1–7
Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):1–8
Lee CC, Chen CC, Wu CY, Huang S-Y (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87
Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211
Islam SKH (2014) Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn 78(3):2261–2276
Khan MK, Zhang J, Wang X (2008) Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3):519–524
He D, Chen Y, Chen J (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157
Lee CC, Lou DC, Li CT (2013) An extended chaotic maps based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866
Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. In: IEEE Transactions on Dependable and Secure Computing
Irshad A, Sher M, Chaudhary SA, Naqvi H, Farash MS (2016) An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. J Supercomput 72(4):1623–1644
Hsieh WB, Leu JS (2014) An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. J Supercomput 70(1):133–148
Zhao D, Peng H, Li YYS (2013) An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. CoRR abs/1305.6350
Tseng YM, Wu TY, Wu J (2008) A pairing-based user authentication scheme for wireless clients with smart card. Informatics 19(2):285–302
Geng J, Zhang L (2008) A dynamic id-based user authentication and key agreement scheme for multi-server environment using bilinear pairings. In: Workshop on Power Electronics and Intelligent Transportation System (PEITS 2008), Guangzhou, pp 33–37
Bergamo P, Arco P, Santis A, Kocarev L (2005) Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans Circ Syst 52:1382–1393
Kocarev L, Lian S (2011) Chaos-based cryptography: theory, algorithms and applications. Springer, Berlin ISBN 978-3-642-20542-2
Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3):669–674
Chain K, Kuo WC (2013) A new digital signature scheme based on chaotic maps. Nonlinear Dyn 74(4):1003–1012
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. FSIAM J Comput 38(1):97–139
Jin A, Ling D, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Porambage P, Braeken A, Schmitt C, Gurtov AV, Ylianttila M, Stiller B (2015) Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3:1503–1511
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of Advances in Cryptology—CRYPTO99, LNCS, vol 1666. Springer, Santa Barbara, pp 388–397
He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37
Lee TF (2015) Provably secure anonymous single-sign-on authentication mechanisms using extended Chebyshev chaotic maps for distributed computer networks. IEEE Syst J PP(99):1–8
Malina HJ, Fujdiak R, Hosek J (2016) On perspective of security and privacy-preserving solutions in the internet of things. Comput Netw 102(19):83–95
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Braeken, A., Kumar, P., Liyanage, M. et al. An efficient anonymous authentication protocol in multiple server communication networks (EAAM). J Supercomput 74, 1695–1714 (2018). https://doi.org/10.1007/s11227-017-2190-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-017-2190-8