Journal ArticleDOI
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
Debiao He,Ding Wang +1 more
TLDR
This paper proposes a biometrics-based authentication scheme for multiserver environment using elliptic curve cryptography and demonstrates the completeness of the proposed scheme using the Burrows-Abadi-Needham logic.Abstract:
The authentication scheme is an important cryptographic mechanism, through which two communication parties could authenticate each other in the open network environment To satisfy the requirement of practical applications, many authentication schemes using passwords and smart cards have been proposed However, passwords might be divulged or forgotten, and smart cards might be shared, lost, or stolen In contrast, biometric methods, such as fingerprints or iris scans, have no such drawbacks Therefore, biometrics-based authentication schemes gain wide attention In this paper, we propose a biometrics-based authentication scheme for multiserver environment using elliptic curve cryptography To the best of our knowledge, the proposed scheme is the first truly three-factor authenticated scheme for multiserver environment We also demonstrate the completeness of the proposed scheme using the Burrows–Abadi–Needham logicread more
Citations
More filters
Journal ArticleDOI
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
TL;DR: This paper first analyzes He-Wang's scheme, then proposes a new secure multi-server authentication protocol using biometric-based smart card and ECC with more security functionalities and shows that the proposed scheme provides secure authentication.
Journal ArticleDOI
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
TL;DR: This work presents a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry and presents a comprehensive heuristic security analysis to show that the protocol is secure against all the possible attacks and provides the desired security features.
Journal ArticleDOI
An exhaustive survey on security and privacy issues in Healthcare 4.0
Jigna J. Hathaliya,Sudeep Tanwar +1 more
TL;DR: An extensive literature review and analysis of state-of-the-art proposals to maintain security and privacy in Healthcare 4.0 are presented and the blockchain-based solution is explored to give insights to both researchers and practitioners communities.
Journal ArticleDOI
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
TL;DR: Security analysis and performance analysis shows the proposed MAAKA scheme has better performance than the existing benchmarked schemes in literature and is more suitable for providing security for various applications in WSNs.
Journal ArticleDOI
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
TL;DR: This work proposes a robust and lightweight authentication scheme for WMSNs, which meets the common security requirements, and keeps away user tracking from attackers, and is suitable for PHSs.
References
More filters
Book ChapterDOI
Differential Power Analysis
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI
An introduction to biometric recognition
TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Book
Handbook of Fingerprint Recognition
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Journal ArticleDOI
A logic of authentication
TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Book ChapterDOI
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.