Journal
WIRELESS PERSONAL COMMUNICATIONS
Volume 95, Issue 3, Pages 3391-3406Publisher
SPRINGER
DOI: 10.1007/s11277-017-4003-z
Keywords
Authentication; Chaotic maps; User anonymity; Biometric; Password; Smart cards
Categories
Funding
- Natural Science Foundation of Zhejiang Province [LZ12F02005]
- National Basic Research Program of China [2013CB834205]
- Key Laboratory of Public Security Information Application Based on Big-data Architecture, Ministry of Public Security [2014DSJSY004]
Ask authors/readers for more resources
In order to provide secure remote access control, a robust and efficient authentication protocol should achieve mutual authentication and session key agreement between clients and the server over public channels. Recently, Wang et al. proposed a password based authentication protocol using chaotic maps. In this paper, we demonstrate the security of their scheme, and show that Wang et al.'s scheme cannot provide session key agreement and is insecure against denial of service attack for no detecting wrong password in password change. To remedy these issues, we use the techniques of fuzzy extractor and chaotic maps to propose a three-factor remote authentication scheme. The new scheme preserves user privacy and is secure against various attacks. Detailed analysis of previous schemes in efficiency and security shows our proposed scheme is more suitable for practical application.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available