Publication Type : Journal Article
Publisher : International Journal of Computers and Applications
Campus : Chennai
School : School of Engineering
Verified : No
Year : 2019
Abstract : Due to the quick expansion and fast growth of computer networks, remote user's authentication and key agreement protocol is required. Chaotic maps play a very important role in the construction of authentication and key agreement protocol. Recently, many of the key agreement protocols are proposed based on chaotic maps and it can generate secure session key as well as resist known-key attacks. In this paper, it has been illustrated that most of the existing schemes cannot establish secure communication. Moreover, chaotic map-based authentications schemes have been found vulnerable to identity guessing, password guessing, impersonation, stolen smart card, and violation of session key attacks. Although some of the protocol has advantages of low computation cost but they lacks to attain security attributes. Moreover, these schemes do not support verified session key security with a minimum number of messages exchanged. Therefore, a chaotic map-based authentication scheme is essential to overcome existing weaknesses.