Browse > Article
http://dx.doi.org/10.7236/JIIBC.2015.15.4.43

User Authentication Scheme based on Security-enhanced Biometric Information for C/S System  

Yang, Hyung-Kyu (Division of Computer&Media-Information engineering, Kangnam University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.15, no.4, 2015 , pp. 43-53 More about this Journal
Abstract
Password-based authentication schemes for server-client system are convenient to use, but vulnerable to dictionary attack or brute-force attack. To solve this vulnerability, Cryptographic secret key is used for security, but difficult to memorize. So, for the first time, Das proposed a biometric-based authentication scheme to solve various problems but it has various vulnerabilities. Afterwards, Jiping et al. improved Das's scheme, but some vulnerabilities remain. In this paper, we analyze the cryptanalysis of Jiping et al.'s authentication scheme and then propose improved biometric based user authentication scheme to resolve the analyzed problem. Moreover, we conduct a security analysis for the proposed scheme and make a comparison between the proposed scheme and other biometric based user authentications.
Keywords
User authentication scheme; Biometrics; Security analysis;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. Kim and C. K. Koc, "Asimple attackon a recently introduced hash-based strong-password authentication scheme," International Journal of Network Security, vol. 1, no. 2, pp. 77-80, 2005.
2 A. K. Das, "Analysis and improvement on an efficient biometric based remote user authentication scheme using smart cards," IET Information Security, vol. 5, no. 3, pp. 145-151, 2011.   DOI
3 C. T. Li, "An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards," in Proceedings of the 5th International IEEE Computer Society Conference on Information Assurance and Security, pp. 517-520, Xi'an, China, 2009.
4 L. Jiping, D. Yaoming, X. Zenggang, and L, Shouyin, "An improved biometric-based user authentication scheme for C/S system," International Journal of Distributed Sensor Networks, 2014.
5 Younsung Choi, et al. "Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System", International Journal of Information and Education Technology, vol. 5, no.7, 2015
6 N.Y. Lee and Y.C. Chiu, "Improved remote authentication scheme with smart card," Computer Standards and Interfaces, pp. 177-180, 2005.
7 P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," in Proc. The 19th Annual International Cryptology Conference on Advances in Cryptology, 1999, pp. 388-397.
8 Seung-Cheol Lim, " A Real-Time Intrusin Detection based on Monitoring in Network Security", Journal of the institute of Inernet, Broadcasting and Comm, vol. 13, issue 3, pp.9-15, Jun. 2013.
9 J. Nam, K. K. R. Choo, M. Kim, J. Paik and D. Won, "Dictionary Attacks against Password-Based Authenticated Three- Party Key exchange protocols," KSII Transactions on Internet and Information Systems, vol. 7, no. 12, 2013, pp. 3244-3260.   DOI