Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Secure Biometric-Based Authentication Schemeusing Chebyshev Chaotic Map for Multi-Server Environment
Research Center Imarat, Defence Research and Development Organization, Hyderabad.
Department of Computer Science and Engineering, Asansol Engineering College, Asansol.
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad.
Department of Information Technology, Jadavpur University, Salt Lake City.
Vise andre og tillknytning
Rekke forfattare: 62018 (engelsk)Inngår i: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 15, nr 5, s. 824-839Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Abstract: Multi-server environment is the most common scenario for a large number of enterprise class applications. In this environment, user registration at each server is not recommended. Using multi-server authentication architecture, user can manage authentication to various servers using single identity and password. We introduce a new authentication scheme for multi-server environments using Chebyshev chaotic map. In our scheme, we use the Chebyshev chaotic map and biometric verification along with password verification for authorization and access to various application servers. The proposed scheme is light-weight compared to other related schemes. We only use the Chebyshev chaotic map, cryptographic hash function and symmetric key encryption-decryption in the proposed scheme. Our scheme provides strong authentication, and also supports biometrics & password change phase by a legitimate user at any time locally, and dynamic server addition phase. We perform the formal security verification using the broadly-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that the presented scheme is secure. In addition, we use the formal security analysis using the Burrows-Abadi-Needham (BAN) logic along with random oracle models and prove that our scheme is secure against different known attacks. High security and significantly low computation and communication costs make our scheme is very suitable for multi-server environments as compared to other existing related schemes.

sted, utgiver, år, opplag, sider
Piscataway, NJ: IEEE, 2018. Vol. 15, nr 5, s. 824-839
HSV kategori
Forskningsprogram
Distribuerade datorsystem
Identifikatorer
URN: urn:nbn:se:ltu:diva-60523DOI: 10.1109/TDSC.2016.2616876ISI: 000443711200008OAI: oai:DiVA.org:ltu-60523DiVA, id: diva2:1047475
Merknad

Validerad;2018;Nivå 2;2018-10-04 (johcin)

Tilgjengelig fra: 2016-11-17 Laget: 2016-11-17 Sist oppdatert: 2019-04-24bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekst

Personposter BETA

Vasilakos, Athanasios

Søk i DiVA

Av forfatter/redaktør
Vasilakos, Athanasios
Av organisasjonen
I samme tidsskrift
IEEE Transactions on Dependable and Secure Computing

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 78 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf