Publication Type : Journal Article
Publisher : Springer
Url : https://link.springer.com/article/10.1007/s12046-019-1254-2
Keywords : Authentication, key agreement, security, privacy
Year : 2019
Abstract : The accelerated growth of internet technologies has offered various services to users, although the access to data comes with a greater encumbrance as data are transferred via a public channel. To ensure authorised and secure data access, various authenticated key agreement protocols have been designed and analysed in recent years. Most of the existing protocols face the efficiency issue. A scheme could be made efficient using lightweight cryptographic operations such as hash functions, XOR operation, etc. However, to control the leakage of password, a biometric-based authentication approach can be adopted. Keeping the focus on these points, the proposed scheme is designed. It has attributes of secure communication, mutual authentication and efficient computation, as well as user anonymity. The security proof is proclaimed using the widely recognised random oracle model, which indicates that the proposed scheme is provably secure under any probabilistic polynomial-time adversary. Moreover, the proposed scheme achieves all desirable security attributes of authentication protocols, which is justified using informal security analysis. The simulation of the proposed scheme is done using the automated validation of internet security protocols and applications tool, which shows that the proposed scheme is safe. Furthermore, the proposed scheme is found to be computationally efficient when compared with the related schemes.
Cite this Research Publication : Dharminder, D., Rana, S., Kundu, N. et al. Construction of lightweight authentication scheme for network applicants using smart cards. Sādhanā 45, 15 (2020). https://doi.org/10.1007/s12046-019-1254-2