A key agreement scheme for identity authentication based on multiple security factors

被引:0
|
作者
Wang Y. [1 ]
Peng X. [1 ]
Bian J. [1 ,2 ]
机构
[1] College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan, 030024, Shanxi
[2] The Center of Information and Network, Shanxi Medical College of Continuing Education, Taiyuan, 030012, Shanxi
来源
Int. J. Simul. Syst. Sci. Technol. | / 3卷 / 13.1-13.7期
关键词
Attack; Authentication; Biometric; ECC; Smart card;
D O I
10.5013/IJSSST.a.17.03.13
中图分类号
学科分类号
摘要
By the study of Li-Hwang's three-factor authenticated key agreement protocol, we find there exists multiple attack in it. Therefore, this paper proposes a remote user authentication protocol based on ECC to improve the protocol. The new protocol only needs one point multiplication of elliptic curve cryptography in login and authentication protocol, so its computation efficiency is high. The protocol can resist all the attack mentioned in this paper, smart cards loss attack included. It is also suited to three-factor authentication protocol including password, mobile devices and biometrics. The comparisons with related schemes in computation price and efficiency show that though it costs a little more computation consumption than relative protocols, it has better performance in robustness. © 2016, UK Simulation Society. All rights reserved.
引用
收藏
页码:13.1 / 13.7
相关论文
共 50 条
  • [31] Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
    Jung, Jaewook
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    SENSORS, 2017, 17 (03)
  • [32] Adaptive Random Key Scheme for Authentication and Key Agreement (ARKS-AKA) for Efficient LTE Security
    Kaur, Kuljit
    Sharma, Ajay Shiv
    Sohal, Harwinder Singh
    Kaur, Arpandeep
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [33] An identity authentication and key agreement protocol based on industrial ethernet bus
    Wang, Jun
    Li, Yongxin
    Hu, Jingtao
    1600, Journal of Chemical and Pharmaceutical Research (06): : 382 - 387
  • [34] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [35] A novel identity-based authentication scheme for IoV security
    Wang, Changguang
    Dai, Zimeng
    Zhao, Dongmei
    Wang, Fangwei
    International Journal of Network Security, 2020, 22 (04) : 627 - 637
  • [36] On the Security of a Mutual Authentication and Key Agreement Protocol based on Chaotic Maps
    Chen, Chien-Ming
    Xu, Linlin
    Zhang, Xiaojie
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, : 143 - 146
  • [37] An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
    Sun, Mei
    Guo, Yuyan
    Zhang, Juan
    Jiang, Mingming
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [38] Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications
    Li, Wei
    Li, Rui
    Wu, Kehe
    Cheng, Rui
    Su, Linping
    Cui, Wenchao
    IEEE ACCESS, 2018, 6 : 71194 - 71207
  • [39] An Interoperable ECC based Authentication and Key Agreement Scheme for IoT Environment
    Sahoo, Asit
    Sahoo, Shreeya Swagatika
    Sahoo, Sampa
    Sahoo, Bibhudatta
    Turuk, Ashok Kumar
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [40] An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    SENSORS, 2013, 13 (08): : 9589 - 9603