2018
DOI: 10.1155/2018/9046064
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity

Abstract: At present, a number of users employ an authentication protocol so as to enjoy protected electronic transactions in wireless networks. In order to establish an efficient and robust the transaction system, numerous researches have been conducted relating to authentication protocols. Recently, Kaul and Awasthi presented an user authentication and key agreement scheme, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses crit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 20 publications
(21 citation statements)
references
References 25 publications
1
20
0
Order By: Relevance
“…On the other hand, biometric authentication [30], [32], [34], [40], [42], [68] is based on the biological character of humans. Additionally, the specific biometric scanner collects unique biological data from a user and matches the stored data, which was collected via the registration process.…”
Section: Technical Methods Of Authentication Mechanism In Iotmentioning
confidence: 99%
“…On the other hand, biometric authentication [30], [32], [34], [40], [42], [68] is based on the biological character of humans. Additionally, the specific biometric scanner collects unique biological data from a user and matches the stored data, which was collected via the registration process.…”
Section: Technical Methods Of Authentication Mechanism In Iotmentioning
confidence: 99%
“…The AVISPA project aims at developing a push-button, industrialstrength technology for the analysis of large-scale Internet security-sensitive protocols and applications [26,27]. The AVISPA Tool provides a suite of applications for building and analyzing formal models of security protocols [28,29]. Protocol models are written in the High Level Protocol Specification Language (HLPSL).…”
Section: Formal Security Analysis: Avispamentioning
confidence: 99%
“…This scheme is feasible for resource constrained devices because it is based on a hash function and biometric encryption without the use of any complicated equipment. Dongwoo et al [17] removed the shortcomings of Kaul at el. [14] and proposed a more secure user authenticated key agreement method.…”
Section: Literature Reviewmentioning
confidence: 99%