2016
DOI: 10.1007/s11277-016-3418-2
|View full text |Cite
|
Sign up to set email alerts
|

An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation

Abstract: Online access has been widely adopted to distribute diversified services to customers. In this architecture, public channels are utilized to exchange information between end users and remote servers at anytime and anywhere. To achieve confidentiality and integrity for transferred data, the related parties have to authenticate each other and negotiate a secret session key to encrypt and decrypt exchanged messages. Since the Lamport's pioneering authentication work in 1981, numerous mechanisms have been proposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 33 publications
(28 reference statements)
0
8
0
Order By: Relevance
“…A biometric-based user verified key agreement system was created by Pan et al [5] for safe access to services offered by Internet of Things (IoT) devices. Despite using lightweight operations, this technique is not immune to DoS assaults since it employs the perceptual hashing (bio hashing) procedure rather than the fuzzy extractor used by [12]. This is largely due to the fact that the bio hashing approach seldom ever generates a particular feature BH(BIOi) from the physiological biometric BIOUi of an authorized user Ui at various input times, despite the fact that it may minimise output error [12].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…A biometric-based user verified key agreement system was created by Pan et al [5] for safe access to services offered by Internet of Things (IoT) devices. Despite using lightweight operations, this technique is not immune to DoS assaults since it employs the perceptual hashing (bio hashing) procedure rather than the fuzzy extractor used by [12]. This is largely due to the fact that the bio hashing approach seldom ever generates a particular feature BH(BIOi) from the physiological biometric BIOUi of an authorized user Ui at various input times, despite the fact that it may minimise output error [12].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Despite using lightweight operations, this technique is not immune to DoS assaults since it employs the perceptual hashing (bio hashing) procedure rather than the fuzzy extractor used by [12]. This is largely due to the fact that the bio hashing approach seldom ever generates a particular feature BH(BIOi) from the physiological biometric BIOUi of an authorized user Ui at various input times, despite the fact that it may minimise output error [12]. There were several biometric applications developed by Gowroju et al [16][17][18][19][20][21] that deals with security related applications efficiently using pupil of the person.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, their scheme is not resilient against DoS attack because of usage of perceptual hashing instead of fuzzy extractor method. 37 Rao and Prema 38 proposed a data logging system using Raspberry Pi 3 based on a modified BLAKE2b hash function that can reduce the time required to hash a message. It also works as a digital signature scheme with short verification time.…”
Section: Related Workmentioning
confidence: 99%
“…To avoid such a "high rate of false rejection," we have used the fuzzy extractor method 18 because it is verified using the Hamming distance in order to avoid "false acceptance and false rejection errors". 37 Moreover, due to the use of current timestamps in each message, even if an adversary intentionally attempts to send the same message many times, these are easily detected by checking the timestamp at the receiver end (as discussed in Proposition 3), and the messages are not processed further. This means that the adversary will not be able to force the entities (users, controller nodes and smart devices) to consume resources (power, storage and computation).…”
Section: F I G U R E 5 Summary Of Login and Authentication Phasementioning
confidence: 99%
See 1 more Smart Citation