z-logo
Premium
An anonymous biometric‐based remote user‐authenticated key agreement scheme for multimedia systems
Author(s) -
Mishra Dheerendra,
Kumari Saru,
Khan Muhammad Khurram,
Mukhopadhyay Sourav
Publication year - 2015
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.2946
Subject(s) - computer science , anonymity , scheme (mathematics) , password , replay attack , computer security , authentication (law) , biometrics , overhead (engineering) , vulnerability (computing) , key (lock) , mathematical analysis , mathematics , operating system
Summary We analyze the security of the Li et al . authentication scheme and show its vulnerability to off‐line password‐guessing and replay attacks. We design a new anonymous authentication scheme. The proposed scheme not only removes the drawback of the scheme of the Li et al . scheme but also protects user's anonymity. Moreover, we show validity of our proposed scheme using Burrows, Abadi, and Needham logic. Our scheme is comparable in terms of the communication and computational overhead with related schemes. Copyright © 2015 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here