Two-factor Mutual Authentication with Fingerprint and MAC Address Validation

PDF (636KB), PP.56-68

Views: 0 Downloads: 0

Author(s)

J.S. Jolin 1 A. Theophilus 1 A. Kathirvel 2,*

1. Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, Tamil Nadu, India

2. Department of Computer Science and Engineering, Tagore Engineering College, Vandalur Rd, Chennai, Tamil Nadu, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2024.06.05

Received: 5 May 2023 / Revised: 12 Jul. 2023 / Accepted: 2 Oct. 2023 / Published: 8 Dec. 2024

Index Terms

Authentication Protocol, Mobile Ad hoc Networks, Smart Card, Security and Privacy, Two-factor Authentication

Abstract

Mobile Ad hoc NETworks (MANET), unlike typical wireless networks, may be used spontaneously without the need for centralized management or network environment. Mobile nodes act as mediators to help multi-hop communications in such networks, and most instances, they are responsible for all connectivity tasks. MANET is a challenging endeavor because these systems can be attacked, which can harm the network. As a result, security concerns become a primary factor for these types of networks. This article aims to present an efficient two-factor smart card-based passcode authentication technique for securing legitimate users on an unprotected network. This scheme enables the password resetting feature. A secured mechanism for sharing keys is offered by using the hash function. We present a new two-factor mutual authentication technique based on an entirely new mechanism called the virtual smart card. Compared to authentication, the proposed method has fewer computation processes but is more time efficient since it is based on a hash function. Additionally, this approach is resistant to most attacker behaviors, such as Mutual authentication, Gateway node bypassing attacks, DoS attacks, replay attacks, Man in the middle attacks, and stolen smart device attacks. Experimental results validate the efficiency of this scheme, and its security is also analyzed.

Cite This Paper

J.S. Jolin, A. Theophilus, A. Kathirvel, "Two-factor Mutual Authentication with Fingerprint and MAC Address Validation", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.6, pp.56-68, 2024. DOI:10.5815/ijcnis.2024.06.05

Reference

[1]M. Adil, R. Khan, M. A. Almaiah, M. Al-Zahrani, M. Zakarya, M.S. Amjad, and R. Ahmed, “MAC-AODV based mutual authentication scheme for constraint-oriented networks,” IEEE Access, vol. 8, pp.44459-44469, 2020.    
[2]U. Jain, M. Hussain and J. Kakarla, “Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks,” International Journal of Communication Systems, vol. 33, no. 9, pp. e4384, 2020.
[3]M. Alshahrani and I. Traore, “Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain,” Journal of information security and applications, vol. 45, pp. 156-175, 2019.
[4]S. Singh and V. K. Chaurasiya, “Mutual authentication scheme of IoT devices in fog computing environment,” Cluster Computing, vol. 24, no. 3, pp. 1643-1657, 2021.
[5]J. Xu, X. Meng, W. Liang, H.  Zhou and K. C.  Li, “A secure mutual authentication scheme of blockchain-based in WBANs,” China Communications, vol. 17, no. 9, pp. 34-49, 2020.
[6]M. Adil, M. A. Jan, S. Mastorakis, H. Song, M. M. Jadoon, S. Abbas and A. Farouk, “Hash-MAC-DSDV: mutual authentication for intelligent IoT-based cyber-physical systems,” IEEE Internet of Things Journal, vol.12, pp. 1-12, 2021.
[7]M. Barbareschi, A. De Benedictis, E. La Montagna, A. Mazzeo and N. Mazzocca, “A PUF-based mutual authentication scheme for cloud-edges IoT systems,” Future Generation Computer Systems, vol. 101, no.2, pp. 246-261, 2019.
[8]M. Sidorov, M. T. Ong, R. V. Sridharan, J. Nakamura, R. Ohmura and J. H.  Khor, “Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains,” IEEE Access, vol. 7, pp. 7273-7285, 2019.
[9]Z. Xu, C. Xu, W. Liang, J. Xu and H. Chen, “A lightweight mutual authentication and key agreement scheme for medical Internet of Things,” IEEE Access, vol. 7, pp. 53922-53931, 2019.
[10]Y. Zhang, K. Cheng, F. Khan, R. Alturki, R. Khan and A. U. Rehman, “A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities,” Journal of Information Security and Applications, vol. 58, pp. 102683, 2021.
[11]A. Kumari, S. Jangirala, M. Y. Abbasi, V. Kumar and M. Alam, “ESEAP: ECC based secure and efficient mutual authentication protocol using smart card,” Journal of Information Security and Applications, vol. 51, pp. 102443, 2020.
[12]S. F. Chiou, H. T. Pan, E. F. Cahyadi and M. S. Hwang, “Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications,” Int. J. Netw. Secur., vol. 21, no. 1, pp. 100-104, 2019.
[13]A. K. Singh, A. Solanki, A. Nayyar and B. Qureshi, “Elliptic curve signcryption-based mutual authentication protocol for smart cards,” Applied Sciences, vol. 10, no. 22, pp. 8291, 2020.
[14]L. Chen and K. Zhang, “Privacy-aware smart card based biometric authentication scheme for e-health,” Peer-to-Peer Networking and Applications, vol. 14, no. 3, pp. 1353-1365, 2021.
[15]M. Karuppiah, A. K. Das, X. Li, S. Kumari, F. Wu, S. A. Chaudhry and R. Niranchana, “Secure remote user mutual authentication scheme with key agreement for cloud environment,” Mobile Networks and Applications, vol. 24, no. 3, pp. 1046-1062, 2019.
[16]H. T. Pan, H. W. Yang and M. S.  Hwang, “An enhanced secure smart card-based password authentication scheme,” Int. J. Netw. Secur., vol. 22, no. 2, pp. 358-363, 2020.
[17]S. S. Sahoo, S. Mohanty and B. Majhi, “Improved biometric-based mutual authentication and key agreement scheme using ECC,” Wireless Personal Communications, vol. 111, no. 2, pp. 991-1017, 2020.
[18]B. D. Deebak and F.  Al-Turjman, “Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 346-360, 2020.
[19]M. K. Sharma and M. J. Nene, “Dual factor third‐party biometric‐based authentication scheme using quantum one-time passwords,” Security and Privacy, vol. 3, no. 6, pp. e129, 2020.
[20]V. Sureshkumar, R. Amin, M. S. Obaidat and I. Karthikeyan, “An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map,” Journal of Information Security and Applications, vol. 53, pp. 102539, 2020.
[21]A. Kumari, S. Jangirala, M. Y. Abbasi, V. Kumar and M. Alam, “ESEAP: ECC based secure and efficient mutual authentication protocol using smart card,” Journal of Information Security and Applications, vol. 51, pp. 102443, 2020.
[22]W. Bian, P. Gope, Y. Cheng and Q. Li, “Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme,” Future Generation Computer Systems, vol. 109, pp. 45-55, 2020.
[23]A. K. Singh, A. Solanki, A. Nayyar and B. Qureshi, “Elliptic curve signcryption-based mutual authentication protocol for smart cards,” Applied Sciences, vol. 10, no. 22, pp. 8291, 2020.
[24]M. J. Hossain, C. Xu, C. Li, S. H. Mahmud, X. Zhang and W. Li, “ICAS: Two-factor identity-concealed authentication scheme for remote-servers,” Journal of Systems Architecture, vol. 117, pp. 102077, 2021.
[25]T. Sudhakar, V. Natarajan, M. Gopinath and J. Saranyadevi, “An enhanced authentication protocol for multi-server environment using password and smart card,” Wireless Personal Communications, vol. 115, no. 4, pp. 2779-2803, 2020.
[26]K. Wu, R. Cheng, W. Cui and W. Li, “A lightweight SM2-based security authentication scheme for smart grids,” Alexandria Engineering Journal, vol. 60, no. 1, pp. 435-446, 2021.
[27]P. G. Chilveri and M. S. Nagmode, “A novel node authentication protocol connected with ECC for heterogeneous network,” Wireless Networks, vol. 26, no. 7, pp. 4999-5012, 2020.