A Secure and Efficient ECC-Based Anonymous Authentication Protocol

被引:9
|
作者
Wang, Feifei [1 ]
Xu, Guoai [1 ]
Gu, Lize [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
REMOTE USER AUTHENTICATION; SMART-CARDS; SCHEME; KEY; CRYPTANALYSIS;
D O I
10.1155/2019/4656281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, remote user authentication protocol plays a great role in ensuring the security of data transmission and protecting the privacy of users for various network services. In this study, we discover two recently introduced anonymous authentication schemes are not as secure as they claimed, by demonstrating they suffer from offline password guessing attack, desynchronization attack, session key disclosure attack, failure to achieve user anonymity, or forward secrecy. Besides, we reveal two environment-specific authentication schemes have weaknesses like impersonation attack. To eliminate the security vulnerabilities of existing schemes, we propose an improved authentication scheme based on elliptic curve cryptosystem. We use BAN logic and heuristic analysis to prove our scheme provides perfect security attributes and is resistant to known attacks. In addition, the security and performance comparison show that our scheme is superior with better security and low computation and communication cost.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Peer-to-Peer Networking and Applications, 2016, 9 : 171 - 192
  • [22] A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    AD HOC NETWORKS, 2014, 18 : 133 - 146
  • [23] A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
    Li, Xiong
    Niu, Jianwei
    Bhuiyan, Md Zakirul Alam
    Wu, Fan
    Karuppiah, Marimuthu
    Kumari, Saru
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3599 - 3609
  • [24] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [25] EAAF: ECC-based anonymous authentication framework for cloud-medical system
    Kumari A.
    Kumar V.
    Abbasi M.Y.
    International Journal of Computers and Applications, 2022, 44 (05) : 491 - 500
  • [26] A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    Liao, Y.-P. (newsun87@mail.sju.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21): : 1 - 13
  • [27] ECC-based Secure and Provable Authentication Mechanism for Smart Healthcare Ecosystem
    Garg, Sahil
    Kaur, Kuljeet
    Kaddoum, Georges
    Chen, Min
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [28] Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
    Ryu, Jongseok
    Oh, Jihyeon
    Kwon, Deokkyu
    Son, Seunghwan
    Lee, Joonyoung
    Park, Yohan
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 11511 - 11526
  • [29] A Provably Secure ECC-based Multi-factor 5G-AKA Authentication Protocol
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Pandey, Pradumn Kumar
    Kaur, Kuljeet
    Garg, Sahil
    Chen, Xi
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 516 - 521
  • [30] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75