Skip to main content
Log in

A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The idea of an internet of things (IoT)-based smart city evolves with the aim of improving the quality of citizens’ lives through the practice of data and announcement (such as email, connection, etc.) tools. The idea of smart cities is believed to be feasible through the incorporation of new technologies such as IoT, automation and machine learning in which IoT plays a key role. When billions of slight strategies drive online and start sharing their information, confirmation has already described as a major security issue nearby the IoT. To exacerbate things, as internet technology advances, advanced hacker methods and new forms of threats arise after each other. It is, therefore, necessary to create efficient authentication protocol that is simpler and easier in order to free users from their anxiety and enhance their user experience. Smart card-based key authentication protocols have formed the normal in the latest years, featuring their exceptionally lightweight, easy-to-use equipment and low-cost apps. We proposed an efficient robust authentication protocol using the extended chaotic map in this article. The security of the proposed authentication protocol formally and informally evaluated to demonstrate robustness. Examination of the quality of the proposed authentication protocol has also given sufficient care of demonstrating the possibility of application in real-time requests.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Algehawi MB, Samsudin A (2010) A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp. PhysLett A 374:4670–4674

    MATH  Google Scholar 

  • Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst-I 52(7):1382–1393

    Article  MathSciNet  Google Scholar 

  • Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36

    Article  Google Scholar 

  • Chang CC, Cheng TF, Hsueh WY (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int J Commun Syst 29(2):290–306

    Article  Google Scholar 

  • Chen BL, Kuo WC, Wu LC (2014) Robust smartcard-based remote user password authentication scheme. Int J Commun Syst 27:377–389

    Article  Google Scholar 

  • Chen C, He DJ, Chan SM, Bu JJ, Gao Y, Fan R (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362

    Article  Google Scholar 

  • Chen F, Liao X, Wong KW, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17:3848–3856

    Article  MathSciNet  Google Scholar 

  • Das AK, Odelu V, Goswami A (2014) A robust and effective smart-card-based remote user authentication mechanism using hash function. Sci World J. https://doi.org/10.1155/2014/719470

  • Farash MS (2017) An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int J Commun Syst 30(1):e2879

    Article  MathSciNet  Google Scholar 

  • Friese I, Heuer J, Kong N (2014) Challenges from the identities of things: introduction of the identities of things discussion group within Kantara initiative. In: Internet of things (WF-IoT), 2014 IEEE World Forum, pp 1–4

  • Gubbi J, Buyya R, Marusic S, Marimuthu Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  • Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Choas Soliton and Fract 39(3):1283–1289

    Article  MathSciNet  Google Scholar 

  • Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Progr Biomed 135:37–50

    Article  Google Scholar 

  • Islam SKH (2016) Design and analysis of an improved smartcard–based remote user password authentication scheme. Int J Commun Syst 29(11):1708–1719

    Article  Google Scholar 

  • Joye M, Olivier F (2010) Side-channel analysis, encyclopedia of cryptography and security. Kluwer Academic Publishers, Springer, USA, pp 571–576

    Google Scholar 

  • Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1:6–21

    Article  Google Scholar 

  • Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of advances in cryptology (Crypto’99), LNCS. Springer, Berlin, Heidelberg, pp 388–397

  • Kumari S, Khan MK (2014) Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme. Int J Commun Syst 27(12):3939–3955

    Article  Google Scholar 

  • Lewis N (2016) IoT tutorial: Mitigating security risks in connected environments. http://searchitchannel.techtarget.com/feature/IoT-tutorial-Mitigating-security-risks-in-connected-environments

  • Li S, Xu LD (2017) Book excerpt: ‘securing the internet of things’. http://internetofthingsagenda.techtarget.com/feature/Book-excerpt-Securing-the-Internet-of-Things

  • Li X, Niu J, Khan MK, Liao J (2013) An enhanced smartcard based remote user password authentication scheme. J Netw Comput Appl 36:1365–1371

    Article  Google Scholar 

  • Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Pers Commun 89(2):569–597

    Article  Google Scholar 

  • Luo M, Zhang Y, Khan MK, He D (2017) An efficient chaos-based two-party key agreement protocol with provable security. Int J Commun Syst 30(14):e3288

    Article  Google Scholar 

  • Ma CG, Wang D, Zhao SD (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215–2227

    Article  Google Scholar 

  • Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman & Hall/CRC, Boca Raton

    MATH  Google Scholar 

  • McDonald C (2014). Premium wearables to push sales growth, say juniper. http://www.computerweekly.com/news/2240230260/Premium-wearables-topush-sales-growth-say-Juniper

  • Meshram C, Li CT, Meshram SG (2019a) An efficient online/offline id-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747–753

    Article  Google Scholar 

  • Meshram C, Lee CC, Meshram SG, Li CT (2019b) An efficient id-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946

    Article  Google Scholar 

  • Meshram C, Lee CC, Meshram SG, Khan MK (2019c) An Identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput 23(24):13127–13138

    Article  Google Scholar 

  • Meshram C, Lee CC, Meshram SG, Ramteke RJ, Meshram A (2020) An efficient mobile-healthcare emergency framework. J Med Syst 44:58

  • Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    Article  MathSciNet  Google Scholar 

  • Mick T, Tourani R, Misra S (2017) Laser: lightweight authentication and secured routing for NDN IoT in smart cities. arXiv preprint arXiv:1703.08453

  • Qi M, Chen J (2017) An efficient two-party authentication key exchange protocol for mobile environment. Int J Commun Syst 30(16):e3341

    Article  Google Scholar 

  • Reddy AG, Suresh D, Phaneendra K, Ji SS, Odelu V (2018) Provably secure pseudo-identity based device authentication for smart cities environment. Sustain Urban Areas 41:878–885

    Google Scholar 

  • Rouse M, Shea S, Burns E (2016a) Smart city. http://internetofthingsagenda.techtarget.com/definition/smart-city

  • Rouse M, Rosencrance L, Shea S, Wigmore I (2016b) Internet of things (IoT). http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT

  • Scroxton A (2015) Robust security and consumer buy-in needed for smart city success. http://www.computerweekly.com/news/2240240594/Robustsecurity-and-consumer-buy-in-needed-for-smart-city-success

  • Song R (2010) Advanced smartcard based password authentication protocol. Comput Stand Interfaces 32(5):321–325

    Article  Google Scholar 

  • Song R, Korba L, Yee G (2007) Analysis of smart card-based remote user authentication schemes. In: Proceedings of the 2007 international conference on security and management, Las Vegas, pp 323–329

  • Sood SK, Sarje AK, Singh K (2010) An improvement of Xu et al.’s authentication scheme using smartcards. In: Proceedings of the 3rd annual ACM Bangalore conference, Bangalore, Karnataka, India, pp 17–25

  • Tang HB, Liu XS (2012) Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. Int J Commun Syst 25(12):1639–1644

    Article  Google Scholar 

  • Tech Target (2017) IoT security. http://searchcio.techtarget.com/essentialguide/An-IT-security-strategy-guide-for-CIOs#guideSection5

  • Till A (2017) The smart way to build smart cities. http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/The-smartway-to-build-smart-cities

  • Xu J, Zhu WT, Feng DG (2009) An improved smartcard based password authentication scheme with provable security. Comput Stand Interfaces 31(4):723–728

    Article  Google Scholar 

  • Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3):669–674

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors would like to thank anonymous reviewers of Soft Computing for their careful and helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandrashekhar Meshram.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meshram, C., Ibrahim, R.W., Deng, L. et al. A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment. Soft Comput 25, 10037–10051 (2021). https://doi.org/10.1007/s00500-021-05929-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-05929-5

Keywords

Navigation