Change search
ReferencesLink to record
Permanent link

Direct link
Secure Biometric-Based Authentication Schemeusing Chebyshev Chaotic Map for Multi-ServerEnvironment
Research Center Imarat, Defence Research and Development Organization, Hyderabad.
Department of Computer Science and Engineering, Asansol Engineering College, Asansol.
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad.
Department of Information Technology, Jadavpur University, Salt Lake City.
Show others and affiliations
Number of Authors: 6
2016 (English)In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018Article in journal (Refereed) Epub ahead of print
Abstract [en]

Abstract: Multi-server environment is the most common scenario for a large number of enterprise class applications. In this environment, user registration at each server is not recommended. Using multi-server authentication architecture, user can manage authentication to various servers using single identity and password. We introduce a new authentication scheme for multi-server environments using Chebyshev chaotic map. In our scheme, we use the Chebyshev chaotic map and biometric verification along with password verification for authorization and access to various application servers. The proposed scheme is light-weight compared to other related schemes. We only use the Chebyshev chaotic map, cryptographic hash function and symmetric key encryption-decryption in the proposed scheme. Our scheme provides strong authentication, and also supports biometrics & password change phase by a legitimate user at any time locally, and dynamic server addition phase. We perform the formal security verification using the broadly-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that the presented scheme is secure. In addition, we use the formal security analysis using the Burrows-Abadi-Needham (BAN) logic along with random oracle models and prove that our scheme is secure against different known attacks. High security and significantly low computation and communication costs make our scheme is very suitable for multi-server environments as compared to other existing related schemes.

Place, publisher, year, edition, pages
2016.
National Category
Media and Communication Technology
Research subject
Mobile and Pervasive Computing
Identifiers
URN: urn:nbn:se:ltu:diva-60523DOI: 10.1109/TDSC.2016.2616876OAI: oai:DiVA.org:ltu-60523DiVA: diva2:1047475
Available from: 2016-11-17 Created: 2016-11-17 Last updated: 2016-12-02

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Vasilakos, Athanasios
By organisation
Computer Science
In the same journal
IEEE Transactions on Dependable and Secure Computing
Media and Communication Technology

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

ReferencesLink to record
Permanent link

Direct link