A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme

@article{Chandrakar2016AST,
  title={A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme},
  author={Preeti Chandrakar and Hari Om},
  journal={Int. J. Bus. Data Commun. Netw.},
  year={2016},
  volume={12},
  pages={62-79}
}
In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement protocol. As they have shown in the presented scheme, is precise and secure according to both formal and informal security analysis. For formal security analysis, they have applied BAN Burrows-Abadi-Needham logic which certifies that the presented scheme provides the amenity of mutual authentication and session key agreement safely. The informal security verification has shown… 

An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem

A safe and reliable remote user authentication and session key agreement scheme using the Rabin cryptosystem that provides robustness against various security attacks as well as efficient in the terms of smart card storage cost, estimated execution time, communication cost and computation cost.

An efficient three factor–based authentication scheme in multiserver environment using ECC

An efficient three factor–based authentication scheme in a multiserver environment using elliptic curve cryptography is proposed, which ensures that it provides mutual‐authentication and session‐key agreement securely and can withstand against some possible mentioned attacks.

A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem

The authors have developed a two factor based remote user authentication scheme using ElGamal cryptosystem that is suitable, secure and applicable in any real time applications.

Cryptanalysis and improvement of a biometric‐based remote user authentication protocol usable in a multiserver environment

This paper proposes an elliptic curve cryptography and biometric‐based remote user authentication protocol for a multiserver environment that resists all known security attacks and provides more security attributes and better complexity as compared with the related existing protocols.

A Secure and Privacy Preserving Remote User Authentication Protocol for Internet of Things Environment

This work designs a secure and robust three-factor remote user authentication and key agreement scheme for remote patient monitoring and simulates the protocol using AVISPA, which proves that the suggested protocol is secure from various security threats.

An extended ECC‐based anonymity‐preserving 3‐factor remote authentication scheme usable in TMIS

This work proposes a 3‐factor–based authentication protocol for TMIS, and uses the Burrows‐Abadi‐Needham logic for validating it, and with the Automated Validation of Internet Security Protocols and Applications tool, it is simulated.

An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring

An enhanced three-factor based remote user authentication protocol in WMSNs environment is proposed that is validated using Burrows–Abadi–Needham logic and then simulated using Automated Validation of Internet Security Protocols and Applications tool.

Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks

The proposed 2P-NCKA (Two-Party Non-Central authority KA) protocol creates a secret key between two users for a MANET which does not assume the use of a central authority and a prior password.

Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System

A biometric-based remote user authentication scheme for E-healthcare system that is able to resist several types of malicious cryptography attacks and is simulated using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and results reveal that the scheme is secure against active and passive attacks.

A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks

This article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring that is efficient in terms of security features, computation cost, communication cost, and execution time.

References

SHOWING 1-10 OF 18 REFERENCES

An improved dynamic ID-based remote user authentication with key agreement scheme

An improved remote user authentication scheme with key agreement

An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography

This paper proposes a two-factor remote mutual authentication and key agreement scheme, which can withstand smart card loss attack, offline password guessing attack and impersonation attack and is much more secure and practical as the secure universal access control mechanism.

An improved smart card based authentication scheme for session initiation protocol

It is shown that Farash’s protocol is insecure against impersonation attack, password guessing attack, lacks user anonymity and is vulnerable to session-specific temporary information attack, and an upgraded protocol is proposed to enhance the security.

An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture

An improved smart card authentication scheme for multi-server architecture is proposed using BAN logic, and the analysis result shows that the proposed scheme is more efficient and secure than Pippal et al.

An enhanced privacy preserving remote user authentication scheme with provable security

This paper analyzed the security of the proposed scheme in random oracle model which confirms the robustness of the scheme against all known attacks and proposed a supplemented scheme to overcome security weaknesses of Kumari et al.

An Improved Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

This work demonstrated that the proposed multi-server authenticated key agreement scheme is vulnerable to servers spoofing attack and cannot protect the user’s anonymity and the session key, even if the adversary only knows the information transmitting in the public channel.

An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems

This study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.

Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems

Security and performance analysis shows superiority of the proposed three-factor anonymous authentication and key agreement scheme for TMIS in comparison with previously proposed schemes that are related to security of TMISs.

An anonymous and efficient remote biometrics user authentication scheme in a multi server environment

This paper proposes an anonymous and efficient remote biometric user authentication scheme for a multi-server architecture with provable security and demonstrates that the approach can remove the aforementioned weaknesses and is well suited for aMulti-server environment.