一种新的基于指纹的移动设备远程用户认证方案

Desong Wang, Jianping Li
{"title":"一种新的基于指纹的移动设备远程用户认证方案","authors":"Desong Wang, Jianping Li","doi":"10.1109/ICACIA.2009.5361152","DOIUrl":null,"url":null,"abstract":"Recently, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Unfortunately, Yoon-Yoo demonstrated that Khan et al.'s scheme was vulnerable to a privileged insider attack and an impersonation attack by using lost or stolen mobile devices. To isolate such problems, Yoon-Yoo proposed an improvement to Khan et al.'s scheme. However, the two authentication schemes required synchronized clocks between the user and the remote system server because of using timestamps in authentication process. Actually, it is fairly complicated to achieve time concurrency mechanism; and network environment and transmission delay is unpredictable, so some drawbacks exist in their scheme. To overcome those weaknesses, a new fingerprint-based remote user authentication scheme using mobile devices is proposed. The proposed scheme can safely achieve mutual authentication between the users and the remote system. Compared with other related schemes, the proposed scheme not only is secure and efficient but also can provide good characteristics. Hence, our proposed scheme can be easily realized in the practical environment.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A new fingerprint-based remote user authentication scheme using mobile devices\",\"authors\":\"Desong Wang, Jianping Li\",\"doi\":\"10.1109/ICACIA.2009.5361152\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Unfortunately, Yoon-Yoo demonstrated that Khan et al.'s scheme was vulnerable to a privileged insider attack and an impersonation attack by using lost or stolen mobile devices. To isolate such problems, Yoon-Yoo proposed an improvement to Khan et al.'s scheme. However, the two authentication schemes required synchronized clocks between the user and the remote system server because of using timestamps in authentication process. Actually, it is fairly complicated to achieve time concurrency mechanism; and network environment and transmission delay is unpredictable, so some drawbacks exist in their scheme. To overcome those weaknesses, a new fingerprint-based remote user authentication scheme using mobile devices is proposed. The proposed scheme can safely achieve mutual authentication between the users and the remote system. Compared with other related schemes, the proposed scheme not only is secure and efficient but also can provide good characteristics. Hence, our proposed scheme can be easily realized in the practical environment.\",\"PeriodicalId\":423210,\"journal\":{\"name\":\"2009 International Conference on Apperceiving Computing and Intelligence Analysis\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Apperceiving Computing and Intelligence Analysis\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACIA.2009.5361152\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACIA.2009.5361152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

最近,Khan等人在移动设备上提出了一种高效实用的基于混沌哈希的指纹生物识别远程用户认证方案。不幸的是,Yoon-Yoo证明了Khan等人的方案很容易受到特权内部攻击和使用丢失或被盗移动设备的冒充攻击。为了隔离这些问题,Yoon-Yoo对Khan等人的方案提出了改进。然而,由于在身份验证过程中使用时间戳,这两种身份验证方案需要在用户和远程系统服务器之间同步时钟。实际上,时间并发机制的实现相当复杂;由于网络环境和传输时延的不可预测性,该方案存在一定的缺陷。为了克服这些缺点,提出了一种基于指纹的移动设备远程用户认证方案。该方案可以安全地实现用户与远程系统之间的相互认证。与其他相关方案相比,该方案不仅安全高效,而且具有良好的特性。因此,我们提出的方案很容易在实际环境中实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A new fingerprint-based remote user authentication scheme using mobile devices
Recently, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Unfortunately, Yoon-Yoo demonstrated that Khan et al.'s scheme was vulnerable to a privileged insider attack and an impersonation attack by using lost or stolen mobile devices. To isolate such problems, Yoon-Yoo proposed an improvement to Khan et al.'s scheme. However, the two authentication schemes required synchronized clocks between the user and the remote system server because of using timestamps in authentication process. Actually, it is fairly complicated to achieve time concurrency mechanism; and network environment and transmission delay is unpredictable, so some drawbacks exist in their scheme. To overcome those weaknesses, a new fingerprint-based remote user authentication scheme using mobile devices is proposed. The proposed scheme can safely achieve mutual authentication between the users and the remote system. Compared with other related schemes, the proposed scheme not only is secure and efficient but also can provide good characteristics. Hence, our proposed scheme can be easily realized in the practical environment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cache replacement strategy for streaming media based on semantic mining A lock-free algorithm for union-find with deletion Optimized GM (1, 1) based on Romber algorithm and quadratic interpolation method Analysis of acupuncture point signal using Wavelet Transform and higher-order statistical method Distributed anomaly detection by model sharing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1