scispace - formally typeset
Journal ArticleDOI

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He, +1 more
- 01 Sep 2015 - 
- Vol. 9, Iss: 3, pp 816-823
TLDR
This paper proposes a biometrics-based authentication scheme for multiserver environment using elliptic curve cryptography and demonstrates the completeness of the proposed scheme using the Burrows-Abadi-Needham logic.
Abstract
The authentication scheme is an important cryptographic mechanism, through which two communication parties could authenticate each other in the open network environment To satisfy the requirement of practical applications, many authentication schemes using passwords and smart cards have been proposed However, passwords might be divulged or forgotten, and smart cards might be shared, lost, or stolen In contrast, biometric methods, such as fingerprints or iris scans, have no such drawbacks Therefore, biometrics-based authentication schemes gain wide attention In this paper, we propose a biometrics-based authentication scheme for multiserver environment using elliptic curve cryptography To the best of our knowledge, the proposed scheme is the first truly three-factor authenticated scheme for multiserver environment We also demonstrate the completeness of the proposed scheme using the Burrows–Abadi–Needham logic

read more

Citations
More filters
Journal ArticleDOI

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards

TL;DR: This paper first analyzes He-Wang's scheme, then proposes a new secure multi-server authentication protocol using biometric-based smart card and ECC with more security functionalities and shows that the proposed scheme provides secure authentication.
Journal ArticleDOI

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks

TL;DR: This work presents a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry and presents a comprehensive heuristic security analysis to show that the protocol is secure against all the possible attacks and provides the desired security features.
Journal ArticleDOI

An exhaustive survey on security and privacy issues in Healthcare 4.0

TL;DR: An extensive literature review and analysis of state-of-the-art proposals to maintain security and privacy in Healthcare 4.0 are presented and the blockchain-based solution is explored to give insights to both researchers and practitioners communities.
Journal ArticleDOI

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks

TL;DR: Security analysis and performance analysis shows the proposed MAAKA scheme has better performance than the existing benchmarked schemes in literature and is more suitable for providing security for various applications in WSNs.
Journal ArticleDOI

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

TL;DR: This work proposes a robust and lightweight authentication scheme for WMSNs, which meets the common security requirements, and keeps away user tracking from attackers, and is suitable for PHSs.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI

An introduction to biometric recognition

TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Book

Handbook of Fingerprint Recognition

TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Book ChapterDOI

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Related Papers (5)