Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the increasing demand of remote user authentication process for accessing many Internet based applications, biometrics based authentication mechanisms are highly being adopted. But using biometrics for these authentication mechanisms the features need to be captured and database need to be stored somewhere. Storing such a huge amount of biometric data itself has many security and privacy issues. Like revoking compromised biometric template is impossible. So template security is very important here. But due to low repeatability of biometrics, it is a challenging task to ensure template security while achieving high recognition performance of valid user. Hence, here we have proposed a keystroke based multi-server authentication mechanism which uses bio-hash template security technique. The bio-hash transform a biometric trait in an invariant feature which helps to increase the recognition performance. A comparison of normal keystroke dynamics and bio-hashed keystroke dynamics authentication performance has been done here. The bio-hashed keystroke shows better ERR of 0.15% compared to plain keystroke with 0.231% ERR.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.

    Article  MathSciNet  Google Scholar 

  2. Chang, C. C., & Wu, T. C. (1991). Remote password authentication with smart cards. IEEE Proceedings E-Computers and Digital Techniques, 138(3), 165–168.

    Article  Google Scholar 

  3. Haller, N. M. (1994). The S/KEY one-time password system. In Symposium on Network and Distributed Systems Security.

  4. Shiuh-Jeng, W., & Jin-Fu, C. (1996). Smart card based secure password authentication scheme. Computers & Security, 15(3), 231–237.

    Article  Google Scholar 

  5. Fan, C. I., Chan, Y. C., & Zhang, Z. K. (2005). Robust remote authentication scheme with smart cards. Computers & Security, 24(8), 619–628.

    Article  Google Scholar 

  6. Lee, S. W., Kim, H. S., & Yoo, K. Y. (2005). Efficient nonce-based remote user authentication scheme using smart cards. Applied Mathematics and Computation, 167(1), 355–361.

    Article  MathSciNet  MATH  Google Scholar 

  7. Liu, J. Y., Zhou, A. M., & Gao, M. X. (2008). A new mutual authentication scheme based on nonce and smart cards. Computer Communications, 31(10), 2205–2209.

    Article  Google Scholar 

  8. Lee, J. K., Ryu, S. R., & Yoo, K. Y. (2002). Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters, 38(12), 1.

    Google Scholar 

  9. Lin, C. H., & Lai, Y. Y. (2004). A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 27(1), 19–23.

    Article  Google Scholar 

  10. Chang, C. C., & Lin, I. C. (2004). Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Operating Systems Review, 38(4), 91–96.

    Article  Google Scholar 

  11. Kim, H. S., Lee, S. W., & Yoo, K. Y. (2003). ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review, 37(4), 32–41.

    Article  Google Scholar 

  12. Scott, M. (2004). Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review, 38(2), 73–75.

    Article  MathSciNet  Google Scholar 

  13. Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K. (2004). Biometric cryptosystems: issues and challenges. In Proceedings of the IEEE 92, 6, pp. 948–960.

  14. Bhargav-Spantzel, A., Squicciarini, A. C., Modi, S., Young, M., Bertino, E., & Elliott, S. J. (2007). Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security, 15(5), 529–560.

    Article  Google Scholar 

  15. Khan, M. K., & Zhang, J. (2007). Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 29(1), 82–85.

    Article  Google Scholar 

  16. Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Ccomputer Applications, 33(1), 1–5.

    Article  Google Scholar 

  17. Li, X., Niu, J.-W., Ma, J., Wang, W.-D., & Liu, C.-L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.

    Article  Google Scholar 

  18. Das, A. K. (2011). Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security, 5(3), 145–151.

    Article  Google Scholar 

  19. Yoon, E.-J., & Yoo, K.-Y. (2013). Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. The Journal of Supercomputing, 63(1), 235–255.

    Article  Google Scholar 

  20. Li, X., Niu, J., Wang, Z., & Chen, C. (2014). Applying biometrics to design three factor remote user authentication scheme with key agreement. Security and Communication Networks, 7(10), 1488–1497.

    Google Scholar 

  21. He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), 816–823.

    Article  Google Scholar 

  22. Kim, H., Jeon, W., Lee, K., Lee, Y., & Won, D. (2012). Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. Computational Science and Its Applications ICCSA, 2012, 391–406.

    Google Scholar 

  23. Jain, A. K., Nandakumar, K., & Nagar, A. (2008). Biometric template security. EURASIP Journal on Advances in Signal Processing, 2008, 113.

    Article  Google Scholar 

  24. Faundez-Zanuy, M. (2004). On the vulnerability of biometric security systems. IEEE Aerospace and Electronic Systems Magazine, 19(6), 3–8.

    Article  Google Scholar 

  25. Matsumoto, T., Matsumoto, H., Yamada, K., & Hoshino, S. (2002). Impact of artificial gummy fingers on fingerprint systems. In Electronic Imaging 2002 (pp. 275–289), International Society for Optics and Photonics.

  26. Jain, A., Bolle, R., & Pankanti, S. (Eds.). (1999). Biometrics: Personal identification in networked society (Vol. 479). Berlin: Springer.

  27. Adler, A. (2004). Images can be regenerated from quantized biometric match score data. In Canadian conference on electrical and computer engineering, 2004 (pp. 469–472). IEEE

  28. Ross, A., Shah, J., & Jain, A. K. (2007). From template to image: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4), 544–560.

    Article  Google Scholar 

  29. Cappelli, R., Maio, D., Lumini, A., & Maltoni, D. (2007). Fingerprint image reconstruction from standard templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(9), 1489–1503.

    Article  Google Scholar 

  30. Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security & Privacy, 99(2), 33–42.

    Article  Google Scholar 

  31. Lin, M. C., & Canny, J. F. (1991). A fast algorithm for incremental distance calculation. Proceedings of IEEE international conference on robotics and automation, 1991 (pp. 1008–1014).

  32. De Maesschalck, R., Jouan-Rimbaud, D., & Massart, D. L. (2000). The mahalanobis distance. Chemometrics and Intelligent Laboratory Systems, 50(1), 1–18.

    Article  Google Scholar 

  33. Kretz, T., Bnisch, C., & Vortisch, P. (2010). Comparison of various methods for the calculation of the distance potential field. In Pedestrian and evacuation dynamics 2008 (pp. 335–346). Berlin, Heidelberg: Springer.

  34. Zhong, Y., Deng, Y., & Jain, A. K. (2012). Keystroke dynamics for user authentication. In 2012 IEEE computer society conference on computer vision and pattern recognition workshops (CVPRW) (pp. 117–123).

  35. Boneh, D. (2011). BlumBlumShub pseudorandom bit generator. Encyclopedia of cryptography and security (pp. 160–160). US: Springer.

  36. Chen, J., Tian, C., Berger, T., & Hemami, S. S. (2006). Multiple description quantization via Gram Schmidt orthogonalization. IEEE Transactions on Information Theory, 52(12), 5197–5217.

    Article  MathSciNet  MATH  Google Scholar 

  37. Nanni, L., & Lumini, A. (2008). Random subspace for an improved biohashing for face authentication. Pattern Recognition Letters, 29(3), 295–300.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Neha, Chatterjee, K. An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment. Wireless Pers Commun 97, 4729–4745 (2017). https://doi.org/10.1007/s11277-017-4748-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4748-4

Keywords

Navigation