Skip to main content
Log in

An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The study of chaotic constructions and their associated cryptographic frameworks has sparked a lot of research interest in recent years. Latest advances in wireless technology and the proliferating limitations posed by open communication channels, biometric-enabled remote client authentication procedures with passwords have recently gained traction. In order to address this problem, this paper proposes a secure biometric-based remote user authentication procedure using convolution-Chebyshev chaotic maps with a key agreement procedure. The extended convolution-Chebyshev chaotic maps-based scheme was developed over the interval \(( - \infty , + \infty ),\) and the required properties for the procedure were verified rigorously. The proposed procedure provides a secure client authentication mechanism using biometrics. Additionally, the projected procedure provides a good key agreement feature with perfect forward secrecy while reducing the computation loads for smart cards. As a result, the proposed procedure outperforms related authentication procedures in terms of security and computational performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

No data was used in this article.

References

  1. Meshram C, Ibrahim RW, Meshram SG, Jamal SS, Imoize AL (2021) An efficient authentication with key agreement procedure using Mittag–Leffler–Chebyshev summation chaotic map under the multi-server architecture. J Supercomput. https://doi.org/10.1007/s11227-021-04039-1

    Article  Google Scholar 

  2. Meshram C, Obaidat MS, Hsiao K-F, Imoize AL, Meshram A (2021) An effective fair off-line electronic cash protocol using extended chaotic maps with anonymity revoking trustee. In: 2021 International Conference on Communications, Computing, Cybersecurity, and Informatics, pp 1–5. https://doi.org/10.1109/ccci52664.2021.9583217

  3. Lin C-H et al (2021) Intelligent symmetric cryptography with chaotic map and quantum based key generator for medical images infosecurity. IEEE Access 9:118624–118639

    Article  Google Scholar 

  4. Kocarev L (2002) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1(3):6–21

    Article  Google Scholar 

  5. Aydın Y, Özkaynak F (2021) Eligibility analysis of different chaotic systems derived from logistic map for design of cryptographic components. In: 2021 International Conference Engineering Technologies and Computer Science (EnT), pp 27–31

  6. Munir N, Khan M, Hazzazi MM, Aijaedi A, Alharbi AR, Hussain I (2021) Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9:105678–105685

    Article  Google Scholar 

  7. Imoize AL, Adedeji O, Tandiya N, Shetty S (2021) 6G enabled smart infrastructure for sustainable society: opportunities, challenges, and research roadmap. Sensors 21(5):1–58. https://doi.org/10.3390/s21051709

    Article  Google Scholar 

  8. Li C-T, Hwang M-S (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5

    Article  Google Scholar 

  9. Meshram C, Obaidat MS, Meshram A (2020) An efficient robust lightweight remote user authentication protocol using extended chaotic maps. In: Proceedings of the 2020 International Conference on Computer, Information, and Telecommunication Systems, CITS 2020, pp 8–13. https://doi.org/10.1109/CITS49457.2020.9232622

  10. Sun Q, Moon J, Choi Y, Won D (2016) An improved dynamic ID based remote user authentication scheme for multi-server environment. In: Green, Pervasive, and Cloud Computing, pp 229–242

  11. Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772

    Article  MathSciNet  Google Scholar 

  12. Fan L, Li J-H, Zhu H-W (2002) An enhancement of timestamp-based password authentication scheme. Comput Secur 21(7):665–667

    Article  Google Scholar 

  13. Lee C-C (2009) On security of an efficient nonce-based authentication scheme for SIP. Int J Netw Secur 9(3):201–203

    Google Scholar 

  14. Shen J-J, Lin C-W, Hwang M-S (2003) Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput Secur 22(7):591–595

    Article  Google Scholar 

  15. Sarohi HK, Khan FU (2013) Graphical password authentication schemes: current status and key issues. Int J Comput Sci Issues 10(2 Part 1):437

    Google Scholar 

  16. Sun H-M, Chen Y-H, Lin Y-H (2011) oPass: a user authentication protocol resistant to password stealing and password reuse attacks. IEEE Trans Inf Forensics Secur 7(2):651–663

    Article  Google Scholar 

  17. Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):1–8

    Article  Google Scholar 

  18. Chaudhry SA, Naqvi H, Farash MS, Shon T, Sher M (2018) An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J Supercomput 74(8):3504–3520

    Article  Google Scholar 

  19. He D, Wang D (2014) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823

    Article  Google Scholar 

  20. Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inf Forensics Secur 10(9):1953–1966

    Article  Google Scholar 

  21. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20

    Article  Google Scholar 

  22. Li C-T, Hwang M-S (2010) An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards. Network 3(4):5

    Google Scholar 

  23. Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer

    Book  MATH  Google Scholar 

  24. Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: security and privacy concerns. IEEE Secur Priv 1(2):33–42

    Article  Google Scholar 

  25. Das AK (2011) Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf Secur 5(3):145–151

    Article  Google Scholar 

  26. Chuang M-C, Chen MC (2014) An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst Appl 41(4):1411–1418

    Article  Google Scholar 

  27. Mishra D, Das AK, Mukhopadhyay S (2014) A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst Appl 41(18):8129–8143

    Article  Google Scholar 

  28. Lin H, Wen F, Du C (2015) An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wirel Pers Commun 84(4):2351–2362

    Article  Google Scholar 

  29. Lu Y, Li L, Yang X, Yang Y (2015) Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards. PLoS ONE 10(5):e1026323

    Google Scholar 

  30. Mir O, Nikooghadam M (2015) A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel Pers Commun 83(4):2439–2461

    Article  Google Scholar 

  31. Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed Tools Appl 77(5):5503–5524

    Article  Google Scholar 

  32. Zhu H, Zhang Y, Sun Y (2016) Provably secure multi-server privacy-protection system based on Chebyshev chaotic maps without using symmetric cryptography. Int J Netw Secur 18(5):803–815

    Google Scholar 

  33. Qi M, Chen J (2018) New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography. Multimed Tools Appl 77(18):23335–23351

    Article  Google Scholar 

  34. Sahoo SS, Mohanty S, Majhi B (2020) Improved biometric-based mutual authentication and key agreement scheme using ECC. Wirel Pers Commun 111(2):991–1017

    Article  Google Scholar 

  35. Meshram C, Obaidat MS, Tembhurne JV, Shende SW, Kalare KW, Meshram SG (2020) A lightweight provably secure digital short-signature technique using extended chaotic maps for human-centered IoT systems. IEEE Syst J. https://doi.org/10.1109/JSYST.2020.3043358

    Article  Google Scholar 

  36. Meshram C, Ibrahim RW, Obaid AJ, Meshram SG, Meshram A, Abd El-Latif AM (2021) Fractional chaotic maps based short signature scheme under human-centered IoT environments. J Adv Res 32:139–148

    Article  Google Scholar 

  37. Meshram C, Lee CC, Meshram SG, Meshram A (2020) OOS-SSS: an efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access 8:80063–80073. https://doi.org/10.1109/ACCESS.2020.2991348

    Article  Google Scholar 

  38. Meshram C, Li C-T, Meshram SG (2019) An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747–753. https://doi.org/10.1007/s00500-018-3112-2

    Article  MATH  Google Scholar 

  39. Meshram C, Ibrahim RW, Deng L, Shende SW, Meshram SG, Barve SK (2021) A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment. Soft Comput 25(15):10037–10051. https://doi.org/10.1007/s00500-021-05929-5

    Article  Google Scholar 

  40. Meshram C, Obaidat MS, Meshram A (2020) An efficient robust lightweight remote user authentication protocol using extended chaotic maps. In: 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), pp 1–6. https://doi.org/10.1109/CITS49457.2020.9232622

  41. Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78(7):7965–7980

    Article  Google Scholar 

  42. Yu Z, Gao C, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923

    Article  Google Scholar 

  43. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  44. Meshram C, Lee CC, Ranadive AS, Li CT, Meshram SG, Tembhurne JV (2020) A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int J Commun Syst 33(7):1–15. https://doi.org/10.1002/dac.4307

    Article  Google Scholar 

  45. Meshram C, Lee C-C, Meshram SG, Li C-T (2019) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946. https://doi.org/10.1007/s00500-018-3332-5

    Article  MATH  Google Scholar 

  46. Premkamal PK, Pasupuleti SK, Alphonse PJA (2020) Efficient escrow-free CP-ABE with constant size ciphertext and secret key for big data storage in cloud. Int J Cloud Appl Comput 10(1):28–45

    Google Scholar 

  47. Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722

    Article  Google Scholar 

  48. Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22–36

    Google Scholar 

  49. Meshram C, Ibrahim RW, Obaidat MS, Sadoun B, Meshram SG, Tembhurne JV (2021) An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Comput 25(14):8905–8920. https://doi.org/10.1007/s00500-021-05781-7

    Article  Google Scholar 

  50. Poongodi M, Malviya M, Hamdi M, Vijayakumar V, Mohammed MA, Rauf HT, Al-Dhlan KA (2021) 5G based Blockchain network for authentic and ethical keyword search engine. IET Commun. https://doi.org/10.1049/cmu2.12251

    Article  Google Scholar 

  51. Mohammed MA, Ibrahim DA, Salman AO (2021) Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language. J Intell Syst 30(1):774–792

    Article  Google Scholar 

  52. Awan MJ et al (2021) Image-based malware classification using VGG19 network and spatial convolutional attention. Electronics 10(19):2444

    Article  Google Scholar 

  53. Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60–68

    Article  Google Scholar 

  54. Gaikwad VP, Tembhurne JV, Meshram C, Lee C-C (2021) Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J Supercomput. https://doi.org/10.1007/s11227-020-03553-y

    Article  Google Scholar 

  55. Mason JC, Handscomb DC (2002) Chebyshev polynomials. CRC Press

    Book  MATH  Google Scholar 

  56. Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 52(7):1382–1393. https://doi.org/10.1109/TCSI.2005.851701

    Article  MathSciNet  MATH  Google Scholar 

  57. Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fract 39(3):1283–1289. https://doi.org/10.1016/j.chaos.2007.06.030

    Article  MathSciNet  MATH  Google Scholar 

  58. Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract 37(3):669–674. https://doi.org/10.1016/j.chaos.2006.09.047

    Article  MathSciNet  MATH  Google Scholar 

  59. Chen F, Liao X, Wong K, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17(10):3848–3856

    Article  MathSciNet  MATH  Google Scholar 

  60. Laine TP (1980) The product formula and convolution structure for the generalized Chebyshev polynomials. SIAM J Math Anal 11(1):133–146

    Article  MathSciNet  MATH  Google Scholar 

  61. He D, Chen Y, Chen J (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157. https://doi.org/10.1007/s11071-012-0335-0

    Article  MathSciNet  MATH  Google Scholar 

  62. He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374. https://doi.org/10.1016/j.comcom.2010.02.031

    Article  Google Scholar 

  63. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference, pp 388–397

  64. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    Article  MathSciNet  MATH  Google Scholar 

  65. Lee C-C, Chen C-L, Wu C-Y, Huang S-Y (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1):79–87. https://doi.org/10.1007/s11071-011-0247-4

    Article  MathSciNet  MATH  Google Scholar 

  66. Lee C-C, Hsu C-W (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1):201–211. https://doi.org/10.1007/s11071-012-0652-3

    Article  MathSciNet  Google Scholar 

  67. Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks. Comput Electr Eng 45:274–285

    Article  Google Scholar 

  68. Secure Hash Standard, National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication. FIPS 180-4, 2015

  69. Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Programs Biomed 135:37–50

    Article  Google Scholar 

  70. Park Y, Park K, Lee K, Song H, Park Y (2017) Security analysis and enhancements of an improved multi-factor biometric authentication scheme. Int J Distrib Sens Netw 13(8):1–12

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank anonymous reviewers of The Journal of Supercomputing for their careful and helpful comments and extend their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research groups program under Grant Number R. G. P. 2/150/42. The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund (PTDF) and the German Academic Exchange Service (DAAD) through the Nigerian-German Postgraduate Program under Grant 57473408.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization was done by CM and RWI; Formal analysis was carried out by ALI; Investigation was done by CM; RWI; and ALI; Methodology was done by CM; RWI; and SSJ; Resources were done by CM; Software was done by SGM; ALI; and SKB; Supervision was done by CM; RWI; and ALI; Validation/Visualization were carried out by CM; SSJ; and RWI; Writing—original draft were done by CM; RWI; and SSJ; Writing—review and editing were carried out by CM; RWI; SSJ; SGM; ALI; and SKB.

Corresponding author

Correspondence to Chandrashekhar Meshram.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meshram, C., Ibrahim, R.W., Meshram, S.G. et al. An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric. J Supercomput 78, 12792–12814 (2022). https://doi.org/10.1007/s11227-021-04280-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04280-8

Keywords

Navigation