Abstract
The study of chaotic constructions and their associated cryptographic frameworks has sparked a lot of research interest in recent years. Latest advances in wireless technology and the proliferating limitations posed by open communication channels, biometric-enabled remote client authentication procedures with passwords have recently gained traction. In order to address this problem, this paper proposes a secure biometric-based remote user authentication procedure using convolution-Chebyshev chaotic maps with a key agreement procedure. The extended convolution-Chebyshev chaotic maps-based scheme was developed over the interval \(( - \infty , + \infty ),\) and the required properties for the procedure were verified rigorously. The proposed procedure provides a secure client authentication mechanism using biometrics. Additionally, the projected procedure provides a good key agreement feature with perfect forward secrecy while reducing the computation loads for smart cards. As a result, the proposed procedure outperforms related authentication procedures in terms of security and computational performance.
Similar content being viewed by others
Data availability
No data was used in this article.
References
Meshram C, Ibrahim RW, Meshram SG, Jamal SS, Imoize AL (2021) An efficient authentication with key agreement procedure using Mittag–Leffler–Chebyshev summation chaotic map under the multi-server architecture. J Supercomput. https://doi.org/10.1007/s11227-021-04039-1
Meshram C, Obaidat MS, Hsiao K-F, Imoize AL, Meshram A (2021) An effective fair off-line electronic cash protocol using extended chaotic maps with anonymity revoking trustee. In: 2021 International Conference on Communications, Computing, Cybersecurity, and Informatics, pp 1–5. https://doi.org/10.1109/ccci52664.2021.9583217
Lin C-H et al (2021) Intelligent symmetric cryptography with chaotic map and quantum based key generator for medical images infosecurity. IEEE Access 9:118624–118639
Kocarev L (2002) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1(3):6–21
Aydın Y, Özkaynak F (2021) Eligibility analysis of different chaotic systems derived from logistic map for design of cryptographic components. In: 2021 International Conference Engineering Technologies and Computer Science (EnT), pp 27–31
Munir N, Khan M, Hazzazi MM, Aijaedi A, Alharbi AR, Hussain I (2021) Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9:105678–105685
Imoize AL, Adedeji O, Tandiya N, Shetty S (2021) 6G enabled smart infrastructure for sustainable society: opportunities, challenges, and research roadmap. Sensors 21(5):1–58. https://doi.org/10.3390/s21051709
Li C-T, Hwang M-S (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5
Meshram C, Obaidat MS, Meshram A (2020) An efficient robust lightweight remote user authentication protocol using extended chaotic maps. In: Proceedings of the 2020 International Conference on Computer, Information, and Telecommunication Systems, CITS 2020, pp 8–13. https://doi.org/10.1109/CITS49457.2020.9232622
Sun Q, Moon J, Choi Y, Won D (2016) An improved dynamic ID based remote user authentication scheme for multi-server environment. In: Green, Pervasive, and Cloud Computing, pp 229–242
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772
Fan L, Li J-H, Zhu H-W (2002) An enhancement of timestamp-based password authentication scheme. Comput Secur 21(7):665–667
Lee C-C (2009) On security of an efficient nonce-based authentication scheme for SIP. Int J Netw Secur 9(3):201–203
Shen J-J, Lin C-W, Hwang M-S (2003) Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput Secur 22(7):591–595
Sarohi HK, Khan FU (2013) Graphical password authentication schemes: current status and key issues. Int J Comput Sci Issues 10(2 Part 1):437
Sun H-M, Chen Y-H, Lin Y-H (2011) oPass: a user authentication protocol resistant to password stealing and password reuse attacks. IEEE Trans Inf Forensics Secur 7(2):651–663
Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):1–8
Chaudhry SA, Naqvi H, Farash MS, Shon T, Sher M (2018) An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J Supercomput 74(8):3504–3520
He D, Wang D (2014) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823
Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inf Forensics Secur 10(9):1953–1966
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20
Li C-T, Hwang M-S (2010) An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards. Network 3(4):5
Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer
Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: security and privacy concerns. IEEE Secur Priv 1(2):33–42
Das AK (2011) Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf Secur 5(3):145–151
Chuang M-C, Chen MC (2014) An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst Appl 41(4):1411–1418
Mishra D, Das AK, Mukhopadhyay S (2014) A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst Appl 41(18):8129–8143
Lin H, Wen F, Du C (2015) An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wirel Pers Commun 84(4):2351–2362
Lu Y, Li L, Yang X, Yang Y (2015) Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards. PLoS ONE 10(5):e1026323
Mir O, Nikooghadam M (2015) A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel Pers Commun 83(4):2439–2461
Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed Tools Appl 77(5):5503–5524
Zhu H, Zhang Y, Sun Y (2016) Provably secure multi-server privacy-protection system based on Chebyshev chaotic maps without using symmetric cryptography. Int J Netw Secur 18(5):803–815
Qi M, Chen J (2018) New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography. Multimed Tools Appl 77(18):23335–23351
Sahoo SS, Mohanty S, Majhi B (2020) Improved biometric-based mutual authentication and key agreement scheme using ECC. Wirel Pers Commun 111(2):991–1017
Meshram C, Obaidat MS, Tembhurne JV, Shende SW, Kalare KW, Meshram SG (2020) A lightweight provably secure digital short-signature technique using extended chaotic maps for human-centered IoT systems. IEEE Syst J. https://doi.org/10.1109/JSYST.2020.3043358
Meshram C, Ibrahim RW, Obaid AJ, Meshram SG, Meshram A, Abd El-Latif AM (2021) Fractional chaotic maps based short signature scheme under human-centered IoT environments. J Adv Res 32:139–148
Meshram C, Lee CC, Meshram SG, Meshram A (2020) OOS-SSS: an efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access 8:80063–80073. https://doi.org/10.1109/ACCESS.2020.2991348
Meshram C, Li C-T, Meshram SG (2019) An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747–753. https://doi.org/10.1007/s00500-018-3112-2
Meshram C, Ibrahim RW, Deng L, Shende SW, Meshram SG, Barve SK (2021) A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment. Soft Comput 25(15):10037–10051. https://doi.org/10.1007/s00500-021-05929-5
Meshram C, Obaidat MS, Meshram A (2020) An efficient robust lightweight remote user authentication protocol using extended chaotic maps. In: 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), pp 1–6. https://doi.org/10.1109/CITS49457.2020.9232622
Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78(7):7965–7980
Yu Z, Gao C, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Meshram C, Lee CC, Ranadive AS, Li CT, Meshram SG, Tembhurne JV (2020) A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int J Commun Syst 33(7):1–15. https://doi.org/10.1002/dac.4307
Meshram C, Lee C-C, Meshram SG, Li C-T (2019) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946. https://doi.org/10.1007/s00500-018-3332-5
Premkamal PK, Pasupuleti SK, Alphonse PJA (2020) Efficient escrow-free CP-ABE with constant size ciphertext and secret key for big data storage in cloud. Int J Cloud Appl Comput 10(1):28–45
Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722
Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22–36
Meshram C, Ibrahim RW, Obaidat MS, Sadoun B, Meshram SG, Tembhurne JV (2021) An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Comput 25(14):8905–8920. https://doi.org/10.1007/s00500-021-05781-7
Poongodi M, Malviya M, Hamdi M, Vijayakumar V, Mohammed MA, Rauf HT, Al-Dhlan KA (2021) 5G based Blockchain network for authentic and ethical keyword search engine. IET Commun. https://doi.org/10.1049/cmu2.12251
Mohammed MA, Ibrahim DA, Salman AO (2021) Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language. J Intell Syst 30(1):774–792
Awan MJ et al (2021) Image-based malware classification using VGG19 network and spatial convolutional attention. Electronics 10(19):2444
Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60–68
Gaikwad VP, Tembhurne JV, Meshram C, Lee C-C (2021) Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J Supercomput. https://doi.org/10.1007/s11227-020-03553-y
Mason JC, Handscomb DC (2002) Chebyshev polynomials. CRC Press
Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 52(7):1382–1393. https://doi.org/10.1109/TCSI.2005.851701
Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fract 39(3):1283–1289. https://doi.org/10.1016/j.chaos.2007.06.030
Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract 37(3):669–674. https://doi.org/10.1016/j.chaos.2006.09.047
Chen F, Liao X, Wong K, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17(10):3848–3856
Laine TP (1980) The product formula and convolution structure for the generalized Chebyshev polynomials. SIAM J Math Anal 11(1):133–146
He D, Chen Y, Chen J (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157. https://doi.org/10.1007/s11071-012-0335-0
He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374. https://doi.org/10.1016/j.comcom.2010.02.031
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference, pp 388–397
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Lee C-C, Chen C-L, Wu C-Y, Huang S-Y (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1):79–87. https://doi.org/10.1007/s11071-011-0247-4
Lee C-C, Hsu C-W (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1):201–211. https://doi.org/10.1007/s11071-012-0652-3
Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks. Comput Electr Eng 45:274–285
Secure Hash Standard, National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication. FIPS 180-4, 2015
Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Programs Biomed 135:37–50
Park Y, Park K, Lee K, Song H, Park Y (2017) Security analysis and enhancements of an improved multi-factor biometric authentication scheme. Int J Distrib Sens Netw 13(8):1–12
Acknowledgements
The authors would like to thank anonymous reviewers of The Journal of Supercomputing for their careful and helpful comments and extend their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research groups program under Grant Number R. G. P. 2/150/42. The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund (PTDF) and the German Academic Exchange Service (DAAD) through the Nigerian-German Postgraduate Program under Grant 57473408.
Author information
Authors and Affiliations
Contributions
Conceptualization was done by CM and RWI; Formal analysis was carried out by ALI; Investigation was done by CM; RWI; and ALI; Methodology was done by CM; RWI; and SSJ; Resources were done by CM; Software was done by SGM; ALI; and SKB; Supervision was done by CM; RWI; and ALI; Validation/Visualization were carried out by CM; SSJ; and RWI; Writing—original draft were done by CM; RWI; and SSJ; Writing—review and editing were carried out by CM; RWI; SSJ; SGM; ALI; and SKB.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Meshram, C., Ibrahim, R.W., Meshram, S.G. et al. An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric. J Supercomput 78, 12792–12814 (2022). https://doi.org/10.1007/s11227-021-04280-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04280-8