Loading…
Applying biometrics to design three-factor remote user authentication scheme with key agreement
ABSTRACT There are some biometrics‐based three‐factor remote user authentication schemes proposed by researchers for ensure high security features for network‐based application systems. Recently, Das pointed out the security flaws of Li and Hwang's three‐factor remote user authentication scheme...
Saved in:
Published in: | Security and communication networks 2014-10, Vol.7 (10), p.1488-1497 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | ABSTRACT
There are some biometrics‐based three‐factor remote user authentication schemes proposed by researchers for ensure high security features for network‐based application systems. Recently, Das pointed out the security flaws of Li and Hwang's three‐factor remote user authentication scheme, and proposed an enhanced biometrics‐based three‐factor remote user authentication scheme. Das's scheme overcomes the defects of Li and Hwang's scheme, and maintains the advantages of Li and Hwang's scheme at the same time. However, after detailed analysis, we find that Das's scheme remains vulnerable to forgery attack and stolen smart card attack; at the same time, Das's scheme cannot provide the session key agreement after the mutual authentication. To provide more security features, we design a three‐factor remote user authentication scheme with key agreement using biometrics. Copyright © 2013 John Wiley & Sons, Ltd.
Biometrics has many excellent features, such as widely available, easy‐to‐use, high recognition rate, high reliability, unique, cannot be copied, lost or forgotten, and so on, so it was being widely used in user authentication. In this paper, we design a new three‐factor remote user authentication scheme with key agreement using biometrics to remove the security weaknesses of previous three‐factor remote user authentication schemes. |
---|---|
ISSN: | 1939-0114 1939-0122 |
DOI: | 10.1002/sec.767 |