Next Article in Journal
Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks
Previous Article in Journal
A New Scalable, Distributed, Fuzzy C-Means Algorithm-Based Mobile Agents Scheme for HPC: SPMD Application
Article Menu

Export Article

Open AccessArticle
Computers 2016, 5(3), 15; doi:10.3390/computers5030015

Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors

1
School of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, China
2
Computer Science Deptment, Education College for Pure Sciences, Basrah University, Basrah 61004, Iraq
*
Author to whom correspondence should be addressed.
Academic Editor: Thomas Strang
Received: 28 March 2016 / Revised: 8 June 2016 / Accepted: 9 June 2016 / Published: 11 July 2016
View Full-Text   |   Download PDF [2387 KB, uploaded 11 July 2016]   |  

Abstract

In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many shortcomings in their scheme. Impersonation attacks and insider attacks could be effective. To overcome these drawbacks, we propose a secure biometric-based remote authentication scheme using biometric characteristics of hand-geometry, which is aimed at withstanding well-known attacks and achieving good performance. Furthermore, our work contains many crucial merits such as mutual authentication, user anonymity, freely chosen passwords, secure password changes, session key agreements, revocation by using personal biometrics, and does not need extra device or software for hand geometry in the login phase. Additionally, our scheme is highly efficient and withstands existing known attacks like password guessing, server impersonation, insider attacks, denial of service (DOS) attacks, replay attacks, and parallel-session attacks. Compared with the other related schemes, our work is powerful both in communications and computation costs. View Full-Text
Keywords: smart card; user authentication; hand geometry; key agreement smart card; user authentication; hand geometry; key agreement
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Yassin, A.A.; Yao, J.; Han, S. Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors. Computers 2016, 5, 15.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Computers EISSN 2073-431X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top