Font Size: a A A

Research And Design Of Remote Identity Authentication Schemes Based On Three-factor In Multi-Environments

Posted on:2018-08-10Degree:DoctorType:Dissertation
Country:ChinaCandidate:M ZhangFull Text:PDF
GTID:1318330566462422Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Identity authentication schemes play an important role in information security.Traditionally,most of the identity authentication schemes are based on passwords or smart cards,but those forms of identity authentication schemes are not enough safe for passwordsare vulnerable to brute force attack and the data may be revealed if the smart card is lost.Instead,biometric have a lot of advantages over traditional authentication methods.What's more,biometric resources are limited and non-renewable and some biological characteristics are part of individual;as a result,the biometric-based authentication schemes are mostly applied in the stand-alone network.With the development of computer network,how to extend the biometric to the network environment has become the focus of research.There are two main modes of authentication based on biometric: the first mode is to only use the biometric;the second is to combine the biometric with the password and the smart card to form the multi-factors authentication mode.From a large number of literature,we can see that there are a variety of security threats in remote identity authentication with the application of biometric alone.The results show that it is not feasible to apply biometric alone to remote identity authentication.This dissertation points out that the three-factor(biometric,password,smart card)authentication scheme offers greater security and feasibility in the field of remote identity authentication.In this dissertation,the three-factor authentication scheme is applied to each typical network environment in experiments which have verified the security of the three-factor authentication schemes along with formal proof and protocol security verification tools.The experimental results show that the three-factor authentication schemes can solve many security problems faced by traditional authentication,without more time consumption or space consumption.Therefore,the three-factor identity authentication schemes have certain research value in various fields of remote identity authentication.On the basis of literature review and in-depth study,this dissertation summarizes the conditions the three-factor authentication scheme should meet,and designs the specific identity authentication scheme for each typical network environment.For example,in order to unify the fuzziness of the biometric and the input stability of the hash function,this dissertation makes some improvement to Fuzzy Extractors algorithm and the Secure Sketch algorithm.In order to resist the user's repeat registration attack,the author introducestime-stamp to solve the problem.A large number of experimental analysis demonstrates that the three-factor authentication schemes are more efficient and secure.The main workof this dissertation is as follows:(1)After analyzing and summarizing a large number of documents,it is pointed out that there are still many security threats in the field of remote identity authentication only based on biometric.In order to solve this problem and the security threats faced by traditional remote authentication,this dissertation points out that the three-factor authentication scheme has higher feasibility and security in remote identity authentication.After summarizing the relevant literature and in-depth study,this dissertation puts forward the security threat model of the three-factor authentication scheme and the conditions that the three-factor authentication scheme needs to meet.(2)As for the specific environment of single server and Fuzzy Extractors algorithm and traditional cryptography related algorithm to design three factors authentication scheme.Compared with the simulation results,it can be seen that there is no significant increase in the time cost and communication cost of the proposed scheme,which can meet the single server environment.Through BAN logic and ProVerif tool,the proposed schemes have higher security.At the same time,the proposed schemes can achieve the session key negotiation and access control also.(3)As for the multi-server network environment,this dissertation first summarizes the conditions that the multi-server remote authentication protocol needs to meet,and then devises the multi-server authentication protocol according to the Secure Sketch algorithm and the Chebyshev Chaotic Maps algorithm.The simulation experiments show that the multi-server scheme proposed in this dissertation has greater robustness and security,is applicable in the multi-server environment.In addition,the scheme proposed in this dissertation can achieve session secret key negotiation and user identity anonymity.(4)As for the wireless body network(WBAN)environment,the author designs a new highsecurity three-factor authentication protocol based on Secure Sketch algorithm.The simulation finds that the Secure Sketch algorithm consumes less time overhead than the Fuzzy Extractors algorithm.Compared with other identity authentication schemes in the WBAN field,the scheme proposed in this dissertation has higher security,and the biological characteristics are processed more reasonably and efficiently.(5)For the environment of wireless sensor networks,this dissertation first sums up the security threats in wireless sensor networks,and then proposes the three-factor authentication scheme based on Secure Sketch algorithm and elliptic curve encryption.In the proposed scheme,this dissertation introduces time-stamp method to resist the repeated registration attack with no more time and communication overhead.At the same time,according to the special requirements of the wireless sensor network,the proposed scheme can achieve identity anonymity between the user and the visited sensor node completely.In a nutshell,this dissertation revolves around the three-factor identity authentication program in many specific areas of application research and design four different areas of identity authentication protocol.Through the experimental and safety proof can be seen,threefactor authentication scheme can meet the needs of different areas of identity authentication in different fields.The research of this dissertation helps to lay a theoretical foundation and accumulate relevant technologies and methods to promote the comprehensive application of the three-factor authentication scheme in various fields.
Keywords/Search Tags:Authentication, Biometric, Three-factor authentication, Secure Sketch, Fuzzy Extractors
PDF Full Text Request
Related items