Skip to main content
Log in

An Improve Three Factor Remote User Authentication Scheme Using Smart Card

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this digital era, two entities can exchange the messages over internet even through the physical distance between them is much far. Before exchange they require to authenticate each other via authentication scheme. Biometric is one of the unique feature for each entity and can be accustomed to identify the authenticity of the entity. Motivated by this, many researchers had proposed the various schemes based on biometric feature for authentication using smart card. As smart card is not a temper resistance consummately, various attacks have been identified by the researchers in the biometric based authentication schemes. In this paper we review Wen et al.’s scheme and we find that Wen et al.’s scheme is vulnerable to insider attack, denial of service attack and user anonymity cannot achieve by them. Then we propose new remote user authentication algorithm where our algorithm is secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. An, Y. (2012). Improved biometrics-based remote user authentication scheme with session key agreement. In FGIT-GDC/IESH/CGAG, pp. 307–315.

  2. An, Y. (2012). Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. BioMed Research International, 2012, 1–6.

    Google Scholar 

  3. Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(12), 1–12.

    Article  Google Scholar 

  4. Chaturvedi, A., Mishra, D., & Mukhopadhyay, S. (2013). Improved biometric-based three-factor remote user authentication scheme with key agreement using smart card. In: Information systems security, Springer, pp. 63–77.

  5. Das, A. K. (2011). Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security, 5(3), 145–151.

    Article  Google Scholar 

  6. Das, A. K. (2011). Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards. arXiv preprint arXiv:1103.3159.

  7. Hwang, M. S., & Li, L. H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.

    Article  Google Scholar 

  8. Jin, A. T. B., Ling, D. N. C., & Goh, A. (2004). Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11), 2245–2255.

    Article  Google Scholar 

  9. Khan, M. K., & Kumari, S. (2013). An improved biometrics-based remote user authentication scheme with user anonymity. BioMed Research International, 2013, 1–9.

    Google Scholar 

  10. Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.

    Article  MathSciNet  Google Scholar 

  11. Lee, C. C., Chang, R. X., & Chen, L. A. (2011). Improvement of Li-Hwang’s biometrics-based remote user authentication scheme using smart cards. WTOC, 10(7), 193–200.

    Google Scholar 

  12. Lee, J., Ryu, S., & Yoo, K. (2002). Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters, 38(12), 1.

    Google Scholar 

  13. Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5.

    Article  Google Scholar 

  14. Li, X., Niu, J., Wang, Z., & Chen, C. (2014). Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks, 7(10), 1488–1497.

    Google Scholar 

  15. Li, X., Niu, J. W., Ma, J., Wang, W. D., & Liu, C. L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.

    Article  Google Scholar 

  16. Lin, C. H., & Lai, Y. Y. (2004). A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 27(1), 19–23.

    Article  Google Scholar 

  17. Nanavati, S., Thieme, M., & Nanavati, R. (2002). Biometrics, identity verification in a networked world. New York: Wiley.

    Google Scholar 

  18. Ratha, N. K., Karu, K., Chen, S., & Jain, A. K. (1996). A real-time matching system for large fingerprint databases. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(8), 799–813.

    Article  Google Scholar 

  19. Sarvabhatla, M., & Vorugunti, C. S. (2014). A secure biometric-based user authentication scheme for heterogeneous WSN. In 2014 Fourth international conference of emerging applications of information technology (EAIT), IEEE, pp. 367–372.

  20. Shingala, M., Patel, C., & Doshi, N. (2015). An improved three factor remote user authentication scheme using smart card. A review. Berlin: Green Publisher.

    Google Scholar 

  21. Truong, T. T., Tran, M. T., & Duong, A. D. (2013). Improved id-based remote user authentication scheme using smart card. In 2013 9th international wireless communications and mobile computing conference (IWCMC), IEEE, pp. 1672–1677.

  22. Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747–1760.

    Article  Google Scholar 

  23. Wu, T. C. (1995). Remote login authentication scheme based on a geometric approach. Computer Communications, 18(12), 959–963.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Shingala.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shingala, M., Patel, C. & Doshi, N. An Improve Three Factor Remote User Authentication Scheme Using Smart Card. Wireless Pers Commun 99, 227–251 (2018). https://doi.org/10.1007/s11277-017-5055-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5055-9

Keywords

Navigation