2015
DOI: 10.1109/tce.2015.7389804
|View full text |Cite
|
Sign up to set email alerts
|

Efficient biometric and password based mutual authentication for consumer USB mass storage devices

Abstract: A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 25 publications
0
14
0
Order By: Relevance
“…But, the researchers have considered biometric feature [2] with the password to enhance the security label. Therefore, many researchers have proposed biometric and password based authentication schemes in [17][18][19][20][21][22][23][24][25][26][27][28]. Li and Hwang [17] proposed a biometrics-based remote user authentication scheme in 2010.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…But, the researchers have considered biometric feature [2] with the password to enhance the security label. Therefore, many researchers have proposed biometric and password based authentication schemes in [17][18][19][20][21][22][23][24][25][26][27][28]. Li and Hwang [17] proposed a biometrics-based remote user authentication scheme in 2010.…”
Section: Literature Surveymentioning
confidence: 99%
“…A collision resistant fuzzy extractor [2,27] can be model as a procedure, known as Gen, which takes a binary string say, B of some metric space M as an input, where M ∈ {0, 1} k , for some k bits and produces a random string say, ϕ ∈ R {0, 1} n , for some n bits and an auxiliary string say, θ ∈ R {0, 1} r , for some r bits, where r = k or n bits. It can be mathematically represented by Gen : M → ϕ × θ.…”
Section: Preliminariesmentioning
confidence: 99%
“…The user at higher level uses a one‐way Hash function to derive the lower level group‐key values. The one‐way hash function used in the proposed protocol is H :{0,1}xx‐xx ∗ →{0,1}xx‐xx p where p is a large prime number . The following equation is used to find the link values L i .…”
Section: Proposed Protocolmentioning
confidence: 99%
“…Client‐server communication is a most generic term in network communication system where users' end is treated as client and they get many facilities and services by accessing the services through Internet. There are lot of applications in real world such that e‐medical system, online payment system, access of USB storage device, grid computing, and so on. But as communications are done through insecure channel like Internet, outsider may hamper the communications.…”
Section: Introductionmentioning
confidence: 99%