• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xu Qingui, Huang Peican, Yang Taolan. An Enhanced Biometrics-Key-Based Remote User Authentication Scheme with Smart Card[J]. Journal of Computer Research and Development, 2015, 52(11): 2645-2655. DOI: 10.7544/issn1000-1239.2015.20140755
Citation: Xu Qingui, Huang Peican, Yang Taolan. An Enhanced Biometrics-Key-Based Remote User Authentication Scheme with Smart Card[J]. Journal of Computer Research and Development, 2015, 52(11): 2645-2655. DOI: 10.7544/issn1000-1239.2015.20140755

An Enhanced Biometrics-Key-Based Remote User Authentication Scheme with Smart Card

More Information
  • Published Date: October 31, 2015
  • Biometrics-based remote user authentication scheme with smart card enforces triple protection including smartcard hardware, user password authentication and biometrics recognition, which brings new breakthrough to authentication. Khan-Kumari scheme, which is characterized with high security performance, is reviewed. Four defects that may do harm to authentication are found in this scheme: flawed encapsulation of user identity secrets, improper access way of them, lack of message freshness check, and insufficient interaction between authentication parties. An enhanced biometrics-key-based remote user authentication scheme with smart card is put forward in this paper. Our scheme enforces four enhancing procedures: mutal verifiable dual factors are used to protect user identity secrets, and playback messages are recognized based on message freshness check, and protected parameters are transmitted after encrypted with dynamic Hash key integrating time flag, and authentication process is made be completed gracefully with acknowledgement message. With these measures, user identity protection is enhanced remarkably. Hence, resistance against smart card cracking, message replay, identity impersonation and service refusal is aggrandized. Security analysis shows that the enhanced scheme effectually fixes vulnerabilities found in Khan-Kumari scheme with small computation and communication cost, achieving remarkably enhanced security performance in defending against varying attacking means. Under the circumstances that even dual protection measures are compromised, the probability of impersonation and authentication failure caused by attacks can be made be less than 10\+{-38}.
  • Related Articles

    [1]Dai Jiarun, Li Zhongrui, Zhang Wanqi, Zhang Yuan, Yang Min. Simulation-Based Fuzzing for Autonomous Driving Systems: Landscapes, Challenges and Prospects[J]. Journal of Computer Research and Development, 2023, 60(7): 1433-1447. DOI: 10.7544/issn1000-1239.202330156
    [2]Sun Liyang, Li Yang, Lin Jianning, Mao Shaojie, Liu Zhong. Community Service Selection Algorithm for Network Simulation Task[J]. Journal of Computer Research and Development, 2014, 51(3): 650-660.
    [3]Liu Zhen, Jin Wei, Huang Peng, and Chai Yanjie. An Emotion Contagion Simulation Model for Crowd Events[J]. Journal of Computer Research and Development, 2013, 50(12): 2578-2589.
    [4]Ren Chuanjun, Huang Hongbing, and Jin Shiyao. A Simulation Approach Based on the Notion of Emergence for Analyzing MAS Trust Model[J]. Journal of Computer Research and Development, 2010, 47(12).
    [5]Zeng Liang, Wu Yagang, and Li Sikun. Real-Time Rigid Body Fracturing Simulation[J]. Journal of Computer Research and Development, 2010, 47(6): 1032-1037.
    [6]Yu Haiquan, Si Guangya, Yang Zhimou, Luo Pi. The Scene Simulation of Crowd Behaviors Oriented to Strategic Decision-Making[J]. Journal of Computer Research and Development, 2010, 47(6): 1020-1025.
    [7]Wang Zonghui, Xiong Hua, Jiang Xiaohong, and Shi Jiaoying. Research on Unified Object Model Supporting HLA-Based Simulation and Parallel Rendering[J]. Journal of Computer Research and Development, 2008, 45(2): 329-336.
    [8]Wu Lei and Du Zhihui. A Dynamic Knowledge-Based Task Scheduling Algorithm in Simulation Grid Environment[J]. Journal of Computer Research and Development, 2008, 45(2): 261-268.
    [9]Wang Yuewu, Jing Jiwu, Xiang Ji, and Liu Qi. Contagion Worm Propagation Simulation and Analysis[J]. Journal of Computer Research and Development, 2008, 45(2): 207-216.
    [10]Wu Junmin, Yang Chao, Chen Guoliang, Zhang Miaohui, and Men Ke. Design and Implementation of a Memory Model Simulator[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1296) PDF downloads (713) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return