Reference Hub13
A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme

A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme

Preeti Chandrakar, Hari Om
Copyright: © 2016 |Volume: 12 |Issue: 2 |Pages: 18
ISSN: 1548-0631|EISSN: 1548-064X|EISBN13: 9781466689336|DOI: 10.4018/IJBDCN.2016070104
Cite Article Cite Article

MLA

Chandrakar, Preeti, and Hari Om. "A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme." IJBDCN vol.12, no.2 2016: pp.62-79. http://doi.org/10.4018/IJBDCN.2016070104

APA

Chandrakar, P. & Om, H. (2016). A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme. International Journal of Business Data Communications and Networking (IJBDCN), 12(2), 62-79. http://doi.org/10.4018/IJBDCN.2016070104

Chicago

Chandrakar, Preeti, and Hari Om. "A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme," International Journal of Business Data Communications and Networking (IJBDCN) 12, no.2: 62-79. http://doi.org/10.4018/IJBDCN.2016070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement protocol. As they have shown in the presented scheme, is precise and secure according to both formal and informal security analysis. For formal security analysis, they have applied BAN (Burrows-Abadi-Needham) logic which certifies that the presented scheme provides the amenity of mutual authentication and session key agreement safely. The informal security verification has shown that the proposed scheme is more vigorous against various sort of cruel threats. Moreover, the authors have simulated the presented scheme using broadly accepted AVISPA tool, whose simulation results make sure that the protocol is not dangerous from active and passive attacks together with replay and man-in-the-middle attacks. In addition, the performance evaluation and the security comparison have revealed that the presented scheme gives strong security as well as better complexity in the context of smart card memory requirement, communication cost and computation cost.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.