Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many shortcomings in their scheme. Impersonation attacks and...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2016-07-01
|
Series: | Computers |
Subjects: | |
Online Access: | http://www.mdpi.com/2073-431X/5/3/15 |
_version_ | 1828119344507256832 |
---|---|
author | Ali A. Yassin Jian Yao Shiyao Han |
author_facet | Ali A. Yassin Jian Yao Shiyao Han |
author_sort | Ali A. Yassin |
collection | DOAJ |
description | In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many shortcomings in their scheme. Impersonation attacks and insider attacks could be effective. To overcome these drawbacks, we propose a secure biometric-based remote authentication scheme using biometric characteristics of hand-geometry, which is aimed at withstanding well-known attacks and achieving good performance. Furthermore, our work contains many crucial merits such as mutual authentication, user anonymity, freely chosen passwords, secure password changes, session key agreements, revocation by using personal biometrics, and does not need extra device or software for hand geometry in the login phase. Additionally, our scheme is highly efficient and withstands existing known attacks like password guessing, server impersonation, insider attacks, denial of service (DOS) attacks, replay attacks, and parallel-session attacks. Compared with the other related schemes, our work is powerful both in communications and computation costs. |
first_indexed | 2024-04-11T13:46:49Z |
format | Article |
id | doaj.art-fb7da1a2db644d609216c96ce42fdedb |
institution | Directory Open Access Journal |
issn | 2073-431X |
language | English |
last_indexed | 2024-04-11T13:46:49Z |
publishDate | 2016-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Computers |
spelling | doaj.art-fb7da1a2db644d609216c96ce42fdedb2022-12-22T04:21:01ZengMDPI AGComputers2073-431X2016-07-01531510.3390/computers5030015computers5030015Strong Authentication Scheme Based on Hand Geometry and Smart Card FactorsAli A. Yassin0Jian Yao1Shiyao Han2School of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, ChinaSchool of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, ChinaSchool of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, ChinaIn 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many shortcomings in their scheme. Impersonation attacks and insider attacks could be effective. To overcome these drawbacks, we propose a secure biometric-based remote authentication scheme using biometric characteristics of hand-geometry, which is aimed at withstanding well-known attacks and achieving good performance. Furthermore, our work contains many crucial merits such as mutual authentication, user anonymity, freely chosen passwords, secure password changes, session key agreements, revocation by using personal biometrics, and does not need extra device or software for hand geometry in the login phase. Additionally, our scheme is highly efficient and withstands existing known attacks like password guessing, server impersonation, insider attacks, denial of service (DOS) attacks, replay attacks, and parallel-session attacks. Compared with the other related schemes, our work is powerful both in communications and computation costs.http://www.mdpi.com/2073-431X/5/3/15smart carduser authenticationhand geometrykey agreement |
spellingShingle | Ali A. Yassin Jian Yao Shiyao Han Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors Computers smart card user authentication hand geometry key agreement |
title | Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors |
title_full | Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors |
title_fullStr | Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors |
title_full_unstemmed | Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors |
title_short | Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors |
title_sort | strong authentication scheme based on hand geometry and smart card factors |
topic | smart card user authentication hand geometry key agreement |
url | http://www.mdpi.com/2073-431X/5/3/15 |
work_keys_str_mv | AT aliayassin strongauthenticationschemebasedonhandgeometryandsmartcardfactors AT jianyao strongauthenticationschemebasedonhandgeometryandsmartcardfactors AT shiyaohan strongauthenticationschemebasedonhandgeometryandsmartcardfactors |