Biometrics-Based AuthenticationScheme for Multi-server EnvironmentBy,M.MUTHUKUMAR.
OBJECTIVEThe authentication scheme is an important cryptographic mechanism, through which two parties could authenticate each other in the open network.In practical many authentication schemes are using passwords and smart cards have been proposed. However, password might be forgotten, and smart cards might be shared, lost, or stolen. In contrast, biometric methods, such as fingerprints or iris, have no drawbacks.
Therefore, biometrics-based authentication schemes gain wide attention.Here we propose a biometrics-based authentication scheme for multi-server environment using elliptic curve cryptography. To the best of our knowledge, the proposed scheme is the first truly three-factor authenticated scheme for multi-server environment.
S.NO PAPER TITLEOBJECTIVE TOOLS/TECHNIQUES 1.Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. The Journal of Supercomputing, (2013). A new secure and efficient biometric based mutual authentication scheme for distributed multi-server network environments Proposed scheme is more secure, with reduced execution time and less storage requirement. The authors have used biometrics, password, smart card and one way hash function and Elliptic Curve Cryptography (ECC) to ensure security of their scheme. 2.Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards 2013 A new biometric authentication scheme eradicates all its security pitfalls, and brings in some additional features, which are suitable for real life applications. The proposed scheme maintains the security of the secret key; provides session key agreement; can withstand insider attacks, man-in-the-middle attacks and replay attacks; and provides proper mutual authentication between the server and the user.
S.NO PAPER TITLEOBJECTIVE TOOLS/TECHNIQUES 3Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics 2013
Timestamps are not required anymore for synchronization. Users are free to choose their passwords. The security of the scheme is strengthened using a strong cryptographic algorithm where the biometric template is used as an encryption key. 4Remote Password Authentication Scheme with Smart Cards and Biometrics 2013
The authors here have proposed a new and improved remote three factor authentication scheme, compares its performance and security with the previously proposed three factor authentication schemes.The fingerprint sensors are placed on the smart cards rather on the image capture devices, which prevents the invaders to steal the biometric traits.
Fingerprint based person authenticationRSA public key cryptographyDiscrete wavelet transformWebers Local descriptors
Less efficiency and not flexible in authentication schemeHigh computational load when key size increasesInefficient texture features due to shift varianceLess accuracy for various lighting condition of images due to the delivery of insufficient descriptors.
FRAMEWORK OF A MULTISERVER AUTHENTICATION SYSTEM.
SOFTWARE& HARDWARE REQUIREMENTS
OPERATING SYSTEM:WINDOWS 8 CORE TECHNOLOGY: MATLAB PROCESSOR : i7 & ABOVE RAM: 4 GB
APPLICATIONSDefense weapon storage AreaBank ATM securityAuthentication and privacy protection
More information security via hybrid crypto systemsBetter texture characterization of palmprint High efficiency and low complexity
D. Yang and B. Yang, A biometric password-basedmulti-server authentication scheme with smart card, in Proceedings of the International Conference on Computer Design and Applications (ICCDA 10), vol. 5, pp. 554559, Qinhuangdao, China, June 2010.
E.-J. Yoon and K.-Y. Yoo, Robust biometrics-based multiserver authentication with key agreement scheme for smart cards on elliptic curve cryptosystem, The Journal of Supercomputing, vol. 63, no. 1, pp. 235255, 2013/
D. He, Security flaws in a biometrics-based multi-server authentication with key agreement scheme, IACR Cryptology ePrint Archive, vol. 365, 2011.
Click here to load reader