Skip to main content

Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments

  • Conference paper
Computational Science and Its Applications – ICCSA 2009 (ICCSA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5593))

Included in the following conference series:

Abstract

Smart card based authenticated key exchange allows a user with smartcards and the server to authenticate each other and to agree on a session key which can be used for confidentiality or data integrity. In the paper, we propose a two-round smart card based AKE (Authenticated Key Exchange) protocol using biometric information which provides mutual authentication but only requires symmetric cryptographic operations. This paper proposes a new protocol which is best suitable in pervasive computing environments thus providing efficiency in number of rounds, forward secrecy and security against known-key attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Awashti, A.K.: Comment on a dynamic ID-based remote user authentication scheme. Transactions on Cryptology 1(2), 15–16 (2004)

    Google Scholar 

  2. Chien, H.Y., Chen, C.H.: A remote authentication scheme preserving user anonymity. In: Intl. Conf. on AINA 2005, vol. 2, pp. 245–248 (March 2005)

    Google Scholar 

  3. Chang, C.C., Hwang, K.F.: Some forgery attacks on a remote user authentication scheme using smart cards. Informatics 14(3), 289–294 (2003)

    MathSciNet  MATH  Google Scholar 

  4. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)

    Article  Google Scholar 

  5. Fan, C.I., Chan, Y.C., Zhang, Z.K.: Robust remote authentication scheme with smart cards. Computers & Security 24(8), 619–628 (2005)

    Article  Google Scholar 

  6. El Gamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  7. Hsu, C.L.: Security of Chien et al.’s remote user authentication scheme using smart cards. Computer Standards and Interfaces 26(3), 167–169 (2004)

    Article  Google Scholar 

  8. Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(1), 28–30 (2000)

    Article  Google Scholar 

  9. Kumar, M.: New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 597–600 (2004)

    Article  Google Scholar 

  10. Ku, W.C., Chang, S.T.: Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Transactions on Communication E88-B(5), 2165–2167 (2005)

    Article  Google Scholar 

  11. Ku, W.C., Chang, S.T., Chiang, M.H.: Further cryptanalysis of fingerprint based remote user authentication scheme using smart cards. IEE Electronics Letters 41(5) (2005)

    Google Scholar 

  12. Khan, M.K., Zhang, J.: Improving the security of a exible biometrics remote user authentication scheme. Computer Standards & Interfaces 29(1), 82–85 (2007)

    Article  Google Scholar 

  13. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  14. Leung, K.C., Cheng, L.M., Fong, A.S., Chan, C.K.: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 49(4), 1243–1245 (2003)

    Article  Google Scholar 

  15. Lee, C.C., Hwang, M.S., Yang, W.P.: A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review 36(3), 46–52 (2002)

    Article  Google Scholar 

  16. Lin, C.H., Lai, Y.Y.: A flexible biometrics remote user authentication scheme. Computer Standard and Interfaces 27(1), 19–23 (2004)

    Article  Google Scholar 

  17. Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint-based remote user authentication scheme using smart cards. IEE Electronics Letters 38(12), 554–555 (2002)

    Article  Google Scholar 

  18. Sun, H.M.: An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(4), 958–961 (2000)

    Article  Google Scholar 

  19. Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 49(2), 414–416 (2003)

    Article  Google Scholar 

  20. Sun, H.M., Yeh, H.T.: Further cryptanalysis of a password authentication scheme with smart cards. IEICE Transactions and Communications E86-B (4), 1412–1415 (2003)

    Google Scholar 

  21. Wang, S.J., Chang, J.F.: Smart card based secure password authentication scheme. Computers & Security 15(3), 231–237 (1996)

    Article  Google Scholar 

  22. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: An improvement of Hwang-Lee-Tang’s simple remote user authentication scheme. Computers & Security 24, 50–56 (2005)

    Article  Google Scholar 

  23. Yang, W.H., Shieh, S.P.: Password authentication schemes with smart cards. Computers & Security 18(8), 727–733 (1999)

    Article  Google Scholar 

  24. Yoon, E.J., Yoo, K.Y.: Biometrics Authenticated Key Agreement Scheme. In: Etzion, O., Kuflik, T., Motro, A. (eds.) NGITS 2006. LNCS, vol. 4032, pp. 345–349. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  25. Yang, C.C., Yang, H.W., Wang, R.C.: Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 578–579 (2004)

    Article  Google Scholar 

  26. ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory IT-31(4), 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  27. Guthery, S.B., Jurgensen, T.M.: SmartCard Developer’s Kit. Macmillan Technical Publishing (1998) ISBN 1–57870–027–2

    Google Scholar 

  28. Rankl, W., Effing, W.: Smart Card Handbook. John Wiley & Sons, Chichester (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yi, W., Kim, S., Won, D. (2009). Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02457-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02457-3_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02456-6

  • Online ISBN: 978-3-642-02457-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics