TY - JOUR
T1 - A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication
AU - Amin, Ruhul
AU - Hafizul Islam, Sk K.
AU - Vijayakumar, Pandi
AU - Khan, Muhammad Khurram
AU - Chang, Victor
N1 - Publisher Copyright:
© Springer Science+Business Media New York 2017.
PY - 2018/5
Y1 - 2018/5
N2 - Remote mutual authentication provides an efficient platform through which an user accesses several resources of the remote serve at anytime over insecure channel and makes their life more comfortable. In this context, lot of key agreement methods have been put forward for enhancing securities. Preserving complete security requirements of the authentication scheme are now becoming challenging research. Hsu et al. proposed similar type of work using bilinear pairing for improving the security weaknesses of the Fang’s scheme, and Das et al.’s scheme. We have studied Hsu et al.’s scheme and pointed out that the scheme is ill-suited since off-line password guessing and new smartcard issue attacks are possible in this scheme. It is our further study that Hsu et al.’s scheme is not preserving session key negotiation and mutual authentication. The same problems also exist in Fang’s scheme and Das et al.’s scheme. The objective of this article is to provide an efficient scheme, which resolves all the existing problems. The AVISPA simulation results on our scheme ensured that active and passive attacks are protected. The informal security discussion claims that the scheme resists all kinds of security attacks. We have shown that the performance of our scheme is relatively superior in comparison with existing works. As anapplication area, anyone can execute our protocol in multimedia big data environment for making secure connection between the client and server.
AB - Remote mutual authentication provides an efficient platform through which an user accesses several resources of the remote serve at anytime over insecure channel and makes their life more comfortable. In this context, lot of key agreement methods have been put forward for enhancing securities. Preserving complete security requirements of the authentication scheme are now becoming challenging research. Hsu et al. proposed similar type of work using bilinear pairing for improving the security weaknesses of the Fang’s scheme, and Das et al.’s scheme. We have studied Hsu et al.’s scheme and pointed out that the scheme is ill-suited since off-line password guessing and new smartcard issue attacks are possible in this scheme. It is our further study that Hsu et al.’s scheme is not preserving session key negotiation and mutual authentication. The same problems also exist in Fang’s scheme and Das et al.’s scheme. The objective of this article is to provide an efficient scheme, which resolves all the existing problems. The AVISPA simulation results on our scheme ensured that active and passive attacks are protected. The informal security discussion claims that the scheme resists all kinds of security attacks. We have shown that the performance of our scheme is relatively superior in comparison with existing works. As anapplication area, anyone can execute our protocol in multimedia big data environment for making secure connection between the client and server.
KW - AVISPA tool
KW - Bilinear pairing
KW - Password
KW - User anonymity
KW - User authentication
UR - http://www.scopus.com/inward/record.url?scp=85055730672&partnerID=8YFLogxK
U2 - 10.1007/s11042-017-4996-z
DO - 10.1007/s11042-017-4996-z
M3 - Article
AN - SCOPUS:85055730672
SN - 1380-7501
VL - 77
SP - 11041
EP - 11066
JO - Multimedia Tools and Applications
JF - Multimedia Tools and Applications
IS - 9
ER -