Next Article in Journal
Improved Algorithm of Partial Transmit Sequence Based on Discrete Particle Swarm Optimization
Previous Article in Journal
Hybrid Deep Learning and Sensitivity Operator-Based Algorithm for Identification of Localized Emission Sources
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures

Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(1), 79; https://doi.org/10.3390/math12010079
Submission received: 1 December 2023 / Revised: 20 December 2023 / Accepted: 22 December 2023 / Published: 25 December 2023
(This article belongs to the Section Mathematics and Computer Science)

Abstract

:
To support more complex and robust online services, enterprise-class applications prefer to interconnect multiple servers as the pedestal to enhance the system’s interoperability. However, the multiserver architecture always struggles to reconcile the trade-off between convenience and security, leaving users exposed to a variety of network attack threats. Existing security authentication schemes based on the Chebyshev Chaotic Map for multiserver architectures cannot provide three-factor (including password, biometric feature, and smart card) security. Therefore, we propose a novel Physical-Unclonable-Function-based Lightweight Three-Factor Authentication (PUF-LTA) scheme, which can achieve three-factor security. The PUF-LTA scheme mainly includes two components: (1) PUF-assisted registration and (2) lightweight mutual authentication with one-time interaction. During the PUF-assisted registration process, to defend against side-channel attacks on smart cards, the login credentials of users are XORed with the unique identifier generated by the PUF so that the adversary cannot obtain these secret login credentials. During the lightweight mutual authentication process, we combine the Chebyshev polynomial map and symmetric encryption/decryption to negotiate the session key between users and servers, which only needs one interaction. The security performance of PUF-LTA is theoretically proved by leveraging the random oracle model. In contrast with relevant multiserver authentication schemes, PUF-LTA is more efficient and suitable for resource-constrained multiserver environments because it can ensure secure three-factor authentication and support flexible biometrics and password updates with less computation cost.

1. Introduction

With significant developments in cloud/edge computing and Internet of Things (IoT), intelligent terminals have become an integral part of human society [1,2,3]. Intelligent terminals often serve as a basic interaction tool among users, experts, and institutions, constantly supporting various remote-access services (e.g., online payment, e-health, and e-commerce) and scanning data (e.g., transactional data, medical diagnosis data, and military data).
As the number of intelligent terminals increases rapidly, it is difficult for conventional single server architecture to respond to high concurrent requests from large-scale terminals in real time due to limited computation, communication, and storage resources. This is because these participants communicate mostly over a public channel, such as wireless communication, and information transmitted over public channels is vulnerable to many cyberattacks (e.g., eavesdropping, replay, interception, modification, and impersonation attacks) [4,5,6].
The single-server authentication scheme is not feasible and burdensome when applied in a multiserver scenario. On one hand, it is very inconvenient for users to register on each server because remembering all usernames and passwords on different servers is very hard. On the other hand, users will suffer from password leakage if they register the same password on different servers. Moreover, existing schemes for the multiserver architecture often adopt modular exponentiation operations or elliptic curve scalar multiplication, which leads to high computation overhead [7,8,9,10].
Hence, designing a robust and lightweight multiserver mutual authentication scheme is crucial for high-level security requirements. Chebyshev’s chaotic map is considered a promising approach to tackle the aforementioned issues because of its efficient computation. To improve authentication efficiency, Chatterjee et al. [11] designed an authentication scheme that integrates Chebyshev’s chaotic map, symmetric encryption/decryption, and a one-way hash function to provide a three-factor authentication protocol for multiserver environments. However, according to the analysis by Yu et al. [12], their integrated scheme still could not resist user impersonation attacks, and it also could not provide enough guarantee for user untraceability. Above all, their scheme did not achieve three-factor security as they claimed. Based on this, an extended authentication scheme was designated by Yu et al., and this scheme was claimed to have the ability to defend against all known security attacks and achieve three-factor security in multiserver environments. Unfortunately, because of design flaws, server impersonation attacks, user impersonation attacks, and man-in-the-middle attacks still can be committed successfully in their scheme. Meanwhile, during the authentication process, user untraceability was not achieved for the scheme-linked personally identifiable information in the user authentication request. It is noteworthy that their scheme still did not achieve three-factor security because biometric information could be obtained by any other legitimate user.
Generally, there are three components in a multiserver authentication architecture, including a registration center (RC), users, and servers. In the authentication process, RC publishes system parameters and offers registration services. Subsequently, users and servers conduct mutual authentication, which means the client verifies the authenticity of the server’s identity, and the server also needs to verify the authenticity of the client’s identity. Ultimately, users can securely access services from the server upon successful mutual authentication. To reduce the computation complexity and improve the security of multiserver authentication, a novel Physical-Unclonable-Function-empowered Lightweight Three-factor Authentication (PUF-LTA) scheme is designed in this paper that requires only one registration for users to access all servers. It ensures true three-factor security, simplifying the user experience and reducing the overall administrative burden.
The main contributions of this paper are listed as follows:
(1)
We analyze the three-factor multiserver authentication scheme proposed by Yu et al. [12], and the result shows that their scheme cannot resist man-in-the-middle attacks or user/server impersonation attacks. Furthermore, their scheme also cannot guarantee untraceability or three-factor security.
(2)
A novel Physical-Unclonable-Function-based Lightweight Three-factor Authentication (PUF-LTA) scheme is proposed for multiserver environments. In our scheme, the login credentials of users and servers are protected by the PUF, supporting three-factor security. Additionally, during the mutual authentication phase of PUF-LTA, only a one-time interaction is required between users and servers to negotiate their session key. This is because Chebyshev’s chaotic map and symmetric encryption/decryption are skillfully integrated during the negotiation process.
(3)
Leveraging random oracle models, the security of the proposed PUF-LTA is theoretically proven. To validate the practicality and efficiency of the proposed PUF-LTA for multiserver architectures, comparisons of security performance, and computation complexity are provided.
The structure of this paper is organized as follows. The related work of multiserver authentication and the preliminaries of this paper are presented in Section 2 and Section 3, respectively. We briefly review Yu et al.’s scheme in Section 4. Section 5 clarifies the vulnerabilities of their scheme. The workflow of the proposed PUF-LTA is presented in Section 6, while the formal and informal security analysis of the PUF-LTA are comprehensively provided in Section 7. Section 8 demonstrates the performance comparison and results discussion against existing methods. We conclude our work in Section 9.

2. Related Work

In the single-server environment, it is general to utilize a password-based authentication mechanism to provide secure authentication over a public channel. Unfortunately, such authentication schemes [13,14,15,16] are impractical and insecure when they are applied to multiserver environments. On one hand, it is troublesome for users to register with each server and remember their different login credentials (e.g., usernames and passwords). On the other hand, strong binding between server access rights and user passwords leads to serious vulnerability if the passwords are leaked or smart cards are lost. For example, the scheme of Li et al. [17] is a password-based authentication framework combined with a neural network for multiserver environments. In the password-based authentication scheme, each user is required to register in the registration center, and then the registered users have unrestricted access to all different servers with the same password. Therefore, their scheme will be unsafe as long as a user’s password is leaked. To resist online dictionary guessing attacks and password testing attacks, Zhang et al. [18] designated a single-sign-on authentication scheme that utilized a password-based threshold to thwart adversaries from compromising the identity servers. Specifically, their scheme introduces multiple identity servers and issues authentication tokens in a thresholded way.
The n-factor authentication protocol enhances the security of the system by adding some static information (e.g., smart card, biological information) as verification proofs. Hence, it is also introduced extensively into multiserver environments to provide stronger identity authentication. In 2014, a robust three-factor authentication scheme was proposed in [19], which integrates biometrics and Elliptic Curve Cryptography (ECC) into a multiserver environment. Although this is the first three-factor authentication scheme that can truly be applied in a multiserver environment, the computation cost and communication cost are substantial, and their scheme also fails to resist server/user impersonation attacks. To address the above drawbacks, Odelu et al. [20] proposed a new three-factor multiserver authentication protocol. However, according to the analysis of Zhang et al., their scheme cannot resist Denial of Service (DoS) attacks or insider attacks, and it lacks robustness, which may lead to system collapse. Then, Zhang et al. [21] proposed an improved three-factor multiserver authentication protocol, which integrates Chebyshev’s chaotic map and a secure sketch algorithm to further reduce computation costs. Unfortunately, the leakage of long-lived master keys could lead to the leakage of past session keys in their scheme, which means their scheme was still vulnerable to Perfect Forward Secrecy. Sudhakar et al. [22] designed a two-factor multiserver authentication protocol, but Cho et al. [23] clarified that their protocol could not guarantee the user’s privacy and would suffer from many cyberspace attacks (e.g., session key disclosure attacks, internal corruption attacks, replay attacks, and man-in-the-middle attacks). Therefore, Cho et al. proposed a more powerful multiserver three-factor protocol for e-governance systems, which aims to integrate a fuzzy extractor to utilize both Elliptic Curve Cryptography (ECC) and biometric features to accomplish two-way authentication. Unfortunately, none of these solutions have achieved three-factor secrecy, that is, when an adversary can obtain two of three factors (password, smart card, or biological information), he/she can launch some attacks. The importance of three-factor secrecy lies in the fact that as long as users ensure that one of the three factors is not obtained by attackers, the security of the solution can be guaranteed.
Recently, a Physical Unclonable Function (PUF), acting as a nonvolatile hardware security technique, has been utilized in loT systems to accomplish mutual authentication among devices [24,25,26,27,28]. Subsequently, the PUF could also be applied in multiserver authentication schemes to improve security. In 2021, Zhang et al. [29] integrated the PUF and cancelable biometrics to accomplish a user authentication scheme in a multiserver environment. Their scheme generates cancelable biometrics through biometrics fusion processing and then provides a multiserver authentication scheme based on secret sharing and Biometrics-as-a-Service. Based on this, their scheme not only ensures the privacy of the user but also enhances the credibility of the biometrics. According to the properties of the PUF, once a physical device deployed with a PUF is attacked, the output value of the PUF will change, which can effectively protect the security of the data stored on the physical device.
Furthermore, Self-Certified Public Key Cryptography (SCPKC) has also been utilized in authentication protocols for multiserver environments. Based on SCPKC, He et al. [30] designed a mobile user authentication protocol, which also provides user anonymity. Compared with two other anonymous mobile user authentication protocols, the computational and communicational costs of their scheme are less than 74.93% and 37.43%. However, Ying et al. [31] stated that their protocol still incurs a significant computational complexity due to the integration of bilinear pairing and scalar multiplication computation. Therefore, Ying et al. further proposed a lightweight protocol, which utilizes SCPKC and ECC. Their scheme utilizes ECC instead of any pairing operation to reduce computational overhead. Besides, their scheme ensures user anonymity and untraceability based on dynamic identities. Unfortunately, Ul Haq et al. [32] found that some specific attacks (e.g., user impersonation attacks, identity guessing attacks, and password guessing attacks) can be carried out against Ying et al.’s scheme, and both strong user anonymity and two-factor security are not truly accomplished. Therefore, Ul Haq et al. designed a new two-factor authentication scheme based on SCPKC to refine Ying et al.’s scheme. Their scheme improves the efficiency of computation and communication compared with Ying et al.’s scheme. Furthermore, Xiong et al. [33] proposed a new multiserver authentication scheme for mobile cloud computing (MCC) environments, which integrates hierarchical access control into the authentication protocol. In 2023, Soni et al. [34] proposed a novel multiserver authentication framework for intelligent healthcare systems, which consists of signature-based static authentication and machine-learning-based continuous monitoring.

3. Preliminaries

3.1. Chebyshev’s Chaotic Map

Chebyshev’s chaotic map can defined as T n x = 2 x T n 1 x T n 2 ( x ) , where n 2 , n Z , x   [ 1 ,   1 ] , T 0 x = 1 , T 1 x = x . When x   1 ,   1 . The semigroup property of Chebyshev’s chaotic map can be represented as T r T s x = T s r x = T s T r x [35].
Zhang et al. [36] stated that the semigroup property of Chebyshev’s chaotic map holds for Chebyshev polynomials defined on the interval [ , + ] . That is to say, T r T s x = T s r x = T s T r x , where T n x = cos n × arccos x   m o d   p , n 2 , n Z , x     [ , + ] , and p is a large prime number.
The chaotic map discrete logarithm problem ( C M D L P ) : If there is a Chebyshev chaotic map y = T r x   m o d   p , where p is a large prime number, and x and y are known, it is computationally infeasible in polynomial-time to calculate the value of r .
The Computation of Chaotic Maps Diffie–Hellman Problem ( C M C D H P ) : If there is an extended Chebyshev polynomial T s x   m o d   p and T r x   m o d   p , where x     [ , + ] , and p is a large prime number, C M C D H P means that it is computationally infeasible in polynomial-time to calculate the value of T s r x   m o d   p .

3.2. Fuzzy Extractor

Biometric information is not completely consistent for the same user (e.g., the different contact surfaces during fingerprint collection). Moreover, considering the threat of information leakage, users hesitate to upload their original biometric information to servers. Therefore, the fuzzy extraction technique is important for biometric application. Dodis et al. [37] proposed the fuzzy extractor algorithm to extract and recover the biometric information. The fuzzy extractor algorithm consists of the generation algorithm G e n   · and the reproduction algorithm R e p ( · ) . In contrast to conventional cryptographic keys, their algorithm is neither precisely reproducible nor distributed uniformly. That is, the fuzzy extractor algorithm extracts a uniformly distributed key from repeated noisy readings of a high-entropy secret.
(1)
The generation of the biological key:
σ ,   τ   = G e n   B i o
B i o is the biological information and G e n   · is the generation function, σ is the biological key, and τ is the recovery parameter which should be saved.
(2)
The recovery of the biological key:
σ = R e p B i o ,   τ
R e p   · is the recovery function, σ is the recovery biometric key, B i o is a new biometric information input by user, and τ is the recovery parameter that is saved in the user’s device.

3.3. Physical Unclonable Function

The Physical Unclonable Function could generate a unique ‘fingerprint’ or trust anchor for a physical entity [38]. Actually, every integrated circuit (IC) has some subtle differences because normal manufacturing cannot avoid slight deviations. For a physical entity with an integrated circuit (IC), the PUF exploits this deviations to generate a unique challenge–response pair.
The PUF has the properties as follows:
  • The output of a PUF is dependent on the physical characteristics of the IC.
  • The output of a PUF must be unpredictable.
  • The PUF circuit is unclonable.
  • The output of the PUF will change as long as any alteration happens to the physical characteristics of the system.
Ideally, physically cloning a PUF is infeasible, and PUFs do not store any secrets but generate the response upon a challenge. More importantly, when a PUF circuit is attacked by any active manipulation (e.g., side-channel attacks), its CRP mapping mechanism will be destructed and the challenge-response pair will also change.

3.4. System Model

Figure 1 is a multiserver model. Any service provider may have one or more servers, and users can use multiserver authentication to obtain services from these servers. A multiserver system includes users, servers, and a registration center (RC). RC will publish the system initialization parameters first; then users and servers should register to the RC through a secure channel, respectively; finally, over a public channel, a user and a server will conduct mutual authentication, negotiate the session key, and securely communicate.

3.5. Adversarial Model

According to the Dolev–Yao model [39] and the security requirements of multiserver authentication, we define the adversary model as follows:
(1)
An adversary could register as a legitimate user or server, but the registration center is completely trustworthy.
(2)
Users and servers can conspire to impersonate another entity. For example, they can impersonate a user to access another server or impersonate a server to provide false resources to other users.
(3)
An adversary has the ability to intercept, eavesdrop, modify, and replay all messages transmitted by public channels.
(4)
An adversary can obtain any two of the three factors to launch attacks but cannot simultaneously obtain all three factors.

4. Review of a Multi-Server Authentication Scheme

Yu et al. [12] proposed an extended chaotic-map-based authentication and key agreement scheme for a multiserver environment. Their scheme mainly consists of five phases: the system setup phase, server registration phase, user registration phase, login and authentication phase, and user password and biometric update phase. Here, we omit the last phase. Table 1 lists the notations used in this paper.

4.1. System Setup Phase

The R C chooses two random numbers x and y in [ , + ] and sets them as the system master keys. Then, R C chooses a secure one-way hash function h ( · ) .

4.2. Server Registration Phase

Step 1: S j chooses identity S I D j and transmits it to R C over a secure channel.
Step 2: Once S I D j is received, R C computes K j = h ( S I D j y ) and publishes { S I D j ,   z } . Afterward, R C transmits K j back to S j through a secure channel.
Step 3: S j receives K j and stores it safely.

4.3. User Registration Phase

Step 1: U i inputs I D i and P W i , and enters B i o i . Then, U i utilizes the biometric hash function B H ( · ) to obtain b i and computes P I D i = h ( I D i b i ) , P W B i = h ( P W i b i ) . Finally, U i sends I D i , P I D i , P W B i to R C to register over a secure channel.
Step 2: Upon U i s registration request, R C calculates A i = h I D i P W B i m o d   n , B i = h ( P I D i x ) , C i = B i P W B i , where 2 4 n 2 8 . Then, R C computes D i j = h ( B i K j ) , E i j = B i K j , F i j = D i j h ( B i ) , where 1 j m , and m denotes the maximum number of servers. Next, { A i , C i , E i j , F i j , n , h · , h x y , z } are stored into the S C i , and S C i is distributed to each U i safely.
Step 3: U i keeps the S C i card safely.

4.4. Login and Authentication Phase

Step 1: U i inserts S C i and inputs I D i , P W i , and enters B i o i . S C i calculates b i = B H ( B i o i ) , P I D i = h ( I D i b j ) , and P W B i = h ( P W i b i ) and then verifies whether A i = h I D i P W B i m o d   n ; if not, S C i rejects the session; else, S C i randomly selects a number n i , chooses the server’s identity S I D j , and computes N i = T n i ( z ) , P i j = E i j h ( S I D j h ( x y ) N i ) , N k = h ( B i N i ) , D i j = F i j h ( B i ) , C I D i j = P I D i h ( P i j B i ) , and M 1 = h ( B i D i j C I D i j N k ) . Finally, U i sends { P i j , C I D i j , N i , M 1 } to server S j .
Step 2: Upon the login request from U i , S j calculates E i j = P i j h ( S I D j h ( x y ) N i ) , B i = E i j K j , D i j = h ( B i K j ) , N k = h ( B i N i ) , and M 1 = h ( B i D i j C I D i N k ) and verifies whether M 1 equals M 1 . If not, S j rejects the session. Else, S j selects a random number n j and calculates N j = T n j ( z ) , P I D i = C I D i j h ( P i j B i ) , M 2 = h ( P I D i P i j D i j B i S I D j N j ) , and M 3 = N k N j . Afterward, S j sends { M 2 , M 3 } to U i .
Step 3: Upon receiving { M 2 ,   M 3 } , U i calculates N j = M 3 N k . U i verifies whether M 2 = h ( P I D i P i j D i j B i S I D j N j ) , if not, U i rejects the session; otherwise, U i computes M 4 = h( B i D i j N j S I D j ) and T i j = T n i ( N j ) and obtains the session key S K i j = h ( P I D i P i j T i j ) . Finally, U i sends { M 4 } to S j .
Step 4: S j receives M 4 and verifies whether M 4 = h( B i D i j N j S I D j ) holds, if not, S j discards the session; otherwise, S j calculates T j i = T n j ( N i ) and negotiates the same session key with U i : S K j i = h P I D i P i j T j i = h P I D i P i j T i j = S K j i .

5. Cryptanalysis of a Multi-Server Authentication Scheme

5.1. User Traceability

Assuming that an adversary is a legitimate user U a , he/she can register a legal U a and obtain S I D j , h ( x y ) .
During the login and authentication phase, P i j = E i j h ( S I D j h ( x y ) N i ) , where N i was transmitted in public channel, S I D j is public, and h ( x y ) is written into the adversary’s S C i . Then, the adversary can extract E i j from P i j , where E i j = B i K j = h ( P I D i x ) h ( S I D j y ) . It is obvious that E i j is bound with P I D i .
In this case, if an adversary is a legal user, they can distinguish whether two sessions are initiated by one user through E i j .

5.2. User Impersonation Attack

Firstly, we assume that an adversary is a legal user U a and they can register as a legal U a . The adversary computes his/her P W B i = h ( P W i b i ) and obtains C i = B i P W B i , E i j = B i K j from R C . Then, the adversary obtains B i = C i P W B i and finally obtains the server’s K j = E i j B i .
Then, the messages sent in the public channel can be eavesdropped on by the adversary. The adversary sends P i j , C I D i j ,   N i ,   M 1 to the server to impersonate the legal user. As long as the server sends M 2 , M 3 , the adversary computes E i j = P i j     h ( S I D j h ( x y ) N i ) , B i = E i j K j , N j = M 3 h ( B i N i ) obtains P I D i = C I D i j h ( P i j B i ) , D i j = h ( B i K j ) , and computes M 4 = h ( B i D i j N j S I D j ) .
Finally, S j certifies that the adversary is legal after receiving M 4 .

5.3. Server Impersonation Attack

At first, an adversary can register a legal U a , therefore, the adversary knows P W B i = h ( P W i b i ) and obtain C i = B i P W B i , E i j = B i K j from R C . Then, the adversary obtains B i = C i P W B i , and finally gets server’s K j = E i j B i .
Then, the adversary can eavesdrop on the messages in the public channel and obtain P i j ,   C I D i j ,   N i ,   M 1 from U i . The adversary tries to impersonate the legal server. The adversary computes E i j = P i j     h S I D j h x y N i , B i = E i j K j , D i j = h B i K j ,   N k = h B i K j ,   M 1 = h B i D i j C I D i j N k and verifies whether M 1 equals M 1 . Next, the adversary chooses a random number n j and calculates N j = T n j ( z ) , P I D i = C I D i j h ( P i j B i ) , M 2 = h ( P I D i P i j D i j B i S I D j N j ) , M 3 = N k N j . Afterward, the adversary sends { M 2 , M 3 } to U i .
Next, U i computes N j = M 3 N k , verifies whether M 2 = h ( P I D i P i j D i j B i S I D j N j ) holds, computes M 4 = h( B i D i j N j S I D j ), T i j = T n i ( N j ) , and obtains the session key S K i j = h ( P I D i P i j T i j ) . Finally, U i sends { M 4 } to the adversary.
In the end, the adversary computes S K j i = h ( P I D i P i j T i j ) and impersonates the server successfully.

5.4. Man-in-the-Middle Attack

At first, an adversary can register a legal U a ; therefore, the adversary knows P W B i = h ( P W i b i ) and obtains C i = B i P W B i , E i j = B i K j from R C . Then, the adversary obtains B i = C i P W B i and finally obtains the server’s K j = E i j B i .
Next, the adversary selects a random number n a and calculates N a = T n a ( z ) .
After receiving P i j , C I D i j , N i , M 1 from U i , the adversary computes E i j = P i j h S I D j h x y N i , B i = E i j K j , D i j = h B i K j , N k = h B i K j , M 1 = h B i D i j C I D i j N k and verifies whether M 1 equals M 1 . Next, the adversary computes P I D i = C I D i j h ( P i j B i ) , M 2 = h ( P I D i P i j D i j B i S I D j N a ) , and M 3 = N k N a . Afterward, the adversary sends { M 2 , M 3 } to U i .
After receiving { M 2 , M 3 } from the adversary, U i computes N a = M 3 N k , verifies whether M 2 = h ( P I D i P i j D i j B i S I D j N j ) holds, computes M 4 = h( B i D i j N j S I D j ), T i a = T n i ( N a ) , and obtains the session key S K i a = h ( P I D i P i j T i a ) . Finally, U i sends { M 4 } to the adversary. In the end, the adversary computes S K a i = h ( P I D i P i j T i a ) and impersonates the server successfully.
Meanwhile, the adversary computes P i j = E i j h S I D j h x y N a , C I D i j = P I D i h ( P i j B i ) , and M 1 = h B i D i j C I D i j N a and sends { P i j , C I D i j , M 1 , N a } to server S j .
After receiving { P i j ,   C I D i j , M 1 ,   N a } from the adversary, server S j computes E i j = P i j h ( S I D j h ( x y ) N a ) , B i = E i j K j , D i j = h ( B i K j ) , N k = h ( B i N a ) , and M 1 = h ( B i D i j C I D i N k ) and verifies whether M 1 equals M 1 . Then, S j chooses a random number n l and calculates N j = T n j ( z ) , P I D i = C I D i j h ( P i j B i ) , M 2 = h ( P I D i P i j D i j B i S I D j N j ) , and M 3 = N k N j . Afterward, S j sends { M 2 , M 3 } to U i , but the message is hijacked by the adversary. After the adversary receives { M 2 ,   M 3 } and computes N j = M 3 N K , M 4 = h( B i D i j N j S I D j , T a j = T n i ( N j ) , they obtains the session key S K a j = h ( P I D i P i j T a j ) . Finally, the adversary sends { M 4 } to S j .
Step 4: S j receives { M 4 } and verifies whether M 4 equals h( B i D i j N j S I D j ), if not, S j rejects the session; otherwise, S j verifies that U a is the legitimate user. Then, S j calculates T j a = T n j ( N a ) and negotiates the session key with the adversary: S K j a = h P I D i P i j T j a = h P I D i P i j T a j = S K j a .
Finally, the adversary commits a man-in-the-middle attack successfully.

5.5. Three-Factor Security

According to the definition of three-factor security, if an adversary can obtain the user’s biometric B i o i and the information { A i ,   C i ,   E i j ,   F i j ,   n ,   h · ,   h x y ,   z } stored in smart card S C i , then the adversary can guess the U i ’s password P W U i and compute b i = B H ( B i o i ) , P W B i = h ( P W U i b i ) , B i = C i P W B i , K j = E i j B i , and D i j = F i j h ( B i ) and check whether D i j = h ( B i K j ) or not. If yes, the guessed password P W U i is correct. Otherwise, they reguess it again till the correct password is found.
Once the adversary obtains the correct password, he/she can know the correct B i ,   K j , D i j . And the adversary can also obtain { P i j ,   C I D i j ,   N i ,   M 1 } from the public channel and obtains P I D i   = C I D i j   h ( P i j B i ) . Because P I D i = h ( I D i b i ) , the adversary can guess the correct I D i , and the adversary can also launch user impersonation attacks.
Therefore, Yu et al.’s scheme cannot achieve three-factor security.

6. The Proposed Scheme

The proposed scheme consists of five phases: (1) System initialization. (2) Sever registration. (3) User registration. (4) Mutual authentication and key agreement. (5) User password and biometric update phase.

6.1. System Initialization

The R C selects two random numbers x and y in , + as master keys of the system. Then, R C chooses a secure one-way hash function h ( · ) .

6.2. Sever Registration

R C selects S I D j as an identity of server S j , computes K j = h ( S I D j x ) , and generates a random number a s j , computes A s j = T a s j ( z ) , then sends K j ,   a s j to S j through a secure channel, and then publishes { S I D j , A s j } .
After receiving K j , a s j from R C , S j generates a challenge C j and computes R j = P U F C j , P K j = K j h R j 1 , P A s j = a s j h R j 2 , and then S j stores S I D j , z , P K j , P A s j , C j , P U F ( · ) secretly.
Figure 2 depicts this phase. It is worth mentioning that using 1 and 2 in calculating the hash functions of P K j and P A s j can reduce the problem of selecting and storing random numbers.

6.3. User Registration

Step 1: The user U i generates an identity number I D i and password P W i and inputs their biometrics B i o i . Then, the fuzzy function G e n ( · ) is utilized to obtain σ i ,   τ i   . Then, U i makes a request { I D i } to the registration center R C to register over a secure channel.
Step 2: Upon the request of U i , R C calculates P I D i = E x I D i t i , where t i is registration time, C i j = h ( P I D i K j ) . And then, R C sends { P I D i , C i j } to U i over a secure channel.
Step 3: Upon sending the message { P I D i , C i j } from R C , U i calculates A i = h I D i P W i σ i m o d   n , n ( 2 4 , 2 8 ) and generates a challenge c i and computes R i = P U F ( c i ) , P C i j = C i j h ( σ i I D i P W i R i j ) , P P I D i = P I D i h ( R i P W i I D i σ i j ) . Finally, U i stores {PPIDi, Ai, PCi, ci, PUF (·), n, h(·), τ i , R e p ( · ) } into S C i and U i keeps card S C i safely.
Figure 3 depicts this phase. It is worth mentioning that using m o d   n when calculating A i can effectively resist password and identity guessing attacks.

6.4. Mutual Authentication and Key Agreement

Figure 4 depicts mutual authentication and key agreement phase.
Step 1: U i inserts smart card S C i and inputs the identity number I D i , password P W i , and biometrics B i o i . Then, S C i computes σ i = R e p B i o i , τ i and verifies whether A i = h I D i P W i σ i m o d   n holds, if not, S C i rejects the session; otherwise, S C i computes R i = P U F ( c i ) , C i j = P C i j h ( σ i I D i P W i R i j ) , P I D i = P P I D i h ( R i P W i I D i σ i j ) . Then, S C i generates two random numbers, n i 1 , n i 2 , and selects the identity of the server S I D j and computes θ 1 = T n i 1 ( z ) , θ 2 = E T n i 1 A s j ( P I D i , n i 2 , T 1 ) , θ 3 = h ( C i j n i 2 T 1 S I D j P I D i ) . U i sends { θ 1 , θ 2 , θ 3 } to S I D j via a public channel.
Step 2: Upon the login request from U i , S j decrypts θ 2 and obtains P I D i , n i 2 , T 1 = D T a s j θ 1 ( θ 2 ) . Then, S j verifies the freshness of T 1 and computes C i j = h ( P I D i K j ) . If θ 3 h ( C i j n i 2 T 1 S I D j P I D i ) , S j rejects the session; otherwise, S j generates a random number n j and calculates θ 4 =   T n j ( z ) , S K j i = h ( T n j ( θ 1 ) P I D i S I D j T 1 T 2 ) , θ 5 = E n i 2 ( n i 2 , θ 4 , T 2 , S K i j ) . Finally, S j sends { θ 5 } to U i through a public channel.
Step 3: U i receives { θ 5 } from S j and decrypts it via Decrypt n i 2 , θ 4 , T 2 , S K j i = D n i 2 ( θ 5 ) . U i checks the freshness of T 2 and the validity of n i 2 . Then, U i computes S K = h ( T n i 1 ( θ 4 ) P I D i S I D j T 1 T 2 ) . If S K j i S K , U i terminates the session; othewiser U i sets the session key S K i j = S K = h ( T n i 1 ( θ 4 ) P I D i S I D j T 1 T 2 ) = S K j i . The mutual authentication between U i and S j is established successfully.

6.5. User Password and Biometric Update Phase

Step 1: U i inserts card S C i , inputs I D U i and P W i , and their biometrics B i o i . Then, S C i computes σ i = R e p B i o i , τ i and verifies whether A i equals h I D i P W i σ i m o d   n , if not, S C i discards the login request; otherwise, S C i asks U i to enter a new password and new biological information.
Step 2: Upon receiving the new password P W i n e w and new biometric feature B i o i n e w of U i , S C i uses the fuzzy extractor to calculate σ i n e w , τ i n e w = G e n B i o i n e w , A i n e w = h I D i P W i n e w σ i n e w m o d   n , P C i j n e w = P C i j h ( σ i I D i P W i R i j ) h ( σ i n e w I D i P W i n e w R i j ) , P P I D i n e w = P P I D i h ( R i P W i I D i σ i j ) h ( R i P W i n e w I D i σ i n e w j ) .
Step 3: S C i replaces P P I D i n e w , A i n e w , P C i j n e w , τ i n e w with P P I D i , A i , P C i j , and τ i .

7. Security Analysis

7.1. Provable Security

Based on the random oracle model, we formally prove the semantic security of our scheme below:
Our scheme is denoted as Scheme II and involves three entities:
(a)
A user U i with identity I D i , password P W D i , and biometrics B i o i ;
(b)
A registration center R C with a private key x ;
(c)
An application server S j with identity S I D j .
They all are treated as an oracle with three possible states:
(a)
A c c e p t e d ;
(b)
R e j e c t e d ;
(c)
N o   o u t p u t .
In this model, there is a probabilistic polynomial-time ( P P T ) adversary A and a challenger C . The security of our scheme is proved by a challenge–response game between the P P T adversary A and the challenger C . In this game, A simulates varieties of attacks by inquiring to C in polynomial-time. The queries are listed as follows:
(1)
Hash h i ( x i ) : An initially empty list L h i is maintained by challenger C in this query. When A executes this query with input x i , C returns an output y i if the tuples ( x i , y i ) exists. Otherwise, challenger C selects a random number y i Z q and sends y i to A . Meanwhile, C inserts ( x i , y i ) in L h i to maintain consistency.
(2)
Execute ( U i t , S j t ): In this query, the adversary A can eavesdrop on the entire authentication process of Scheme II. If A asks C to execute this query, C calculates the messages according to the steps in II and returns the results to A .
(3)
Send ( U i t / S j t ,   M s g ): In this query, A can attack Scheme II actively. When A executes this query with a message M s g , C checks if M s g is valid. If it is valid, C calculates some results as the steps of Scheme II; otherwise, C ignores this query.
(4)
Reveal ( U i t ): In this query, C returns the current session key between U i t and A S j t to A .
(5)
Corrupt ( U i t , c ): A can obtain any two of three factors: password and smart card, smart card and biometric, or biometric and password. It is impossible to obtain three factors simultaneously. In this query, C outputs different results as follows:
If c = 0, C outputs the secret data stored in S C i of U i to A .
If c = 1, C outputs the password P W i of U i to A .
If c = 2, C outputs the biometric information B i o i of U i to A .
(6)
Test ( U i t ): In this query, C generates a random secret coin b { 0,1 } . If b = 1, C returns A with the correct session key. If b = 0, C randomly generates a number with the same length of the session and returns it to A .
Definition 1
(AKA-Secure). Pr[S] is denoted as the success probability of  A  to breach Scheme II. If  A  executes the test query and guesses a correct bit  b { 0 ,   1 } , we say that  A  breaches the semantic security of Scheme II. Then, the advantage of  A  to breach the semantic security of Scheme II is denoted as  E x p I I A K A ( A )  =  | P r S 1 2 | , where AKA represents the authenticated key agreement. Our Scheme II achieves semantic  A K A s e c u r e  if  E x p I I A K A  is negligible for any  P P T  adversary  A .
Theorem 1.
We assume that  D  is the password space,  D   10 6 ,  k  represents the size of the biometric information, and  l  represents the length of  h ( · ) . Suppose  q s ,   q e , and  q h  denote the number of queries that  A  executes send, execute, and hash  h i . Then, we have
E x p I I , A A K E t   q h 2 2 l + q s + q e 2 2 l + 2 q s · max 1 D , 1 2 k , f p + q s 2 l 1 + 2 q h · q s + q e 2 E x p A C D H t ,
In polynomial-time  t , the probability of  A  to successfully solve the CDH problem is denoted as  E x p A C D H ( t ) , where  t = t + ( q s + q e ) · T e p .
Proof. 
We prove the security of the session key in Scheme II by executing the following games G i , ( i = 0 , 1 , 2 , 3 , 4 ) . Let S i refer to the event that A tries to breach the secrecy of the session key negotiated in each G i . Additionally, we assume that an event E may happen when A executes Scheme II such that the event E is independent of S i and can be detected by C . It is noteworthy that S i and S i + 1 are indistinguishable, except when E occurs.
Therefore,
P r S i + 1 P r S i   Pr E .
(1)
G 0 : In this game, the simulation of breaching the semantic security of Scheme II is executed in the random oracle model (ROM), and we have
E x p I I A K E t = | Pr S 0 1 2 |
(2)
G 1 : In this game, A simulates the ROM by executing queries, including execute, send, and hash queries. In the hash query, A tries to find the collisions for θ 3 . From the conclusion of a birthday attack, the success probability of a hash collision is q h 2 2 l + 1 . Executing a send query or an execute query can generates the message. Therefore, the success probability of A to find a collision is controlled by at most q s + q e 2 2 l + 1 , where h i · : { 0 ,   1 }   { 0 ,   1 } l . Then, we have:
Pr S 1 Pr S 0   q h 2 2 l + 1 + q s + q e 2 2 l + 1 .
(3)
G 2 : Here, A can execute Corrupt ( U i t ,   c ) to obtain the secret information stored in S C i on the condition that the device is lost or stolen. A simulates as follows:
(a)
A executes a Corrupt ( U i t ,   2 ) query to guess the password of U i from password space D within a q s number of send queries. Hence, the probability of a successful guess is q s D .
(b)
A executes a Corrupt ( U i t ,   1 ) query and speculates the biometric key σ i of U i .
(i)
The probability of successful guessing σ i ( k -bit) is q s 2 k .
(ii)
A can take advantage of the false positive f p to guess σ i , which is chosen randomly from a uniform distribution { 0 ,   1 } k .
Because A can guess either the password or biometric key but not both, A can execute either the < C o r r u p t U i t ,   0 , C o r r u p t ( U i t ,   1 ) > or < C o r r u p t U i t ,   0 , C o r r u p t ( U i t ,   2 ) > queries. The total probability of success is max { q s · ( 1 D , 1 2 k , f p ) } .
| Pr [ S 2 ] Pr [ S 1 ] |   max { q s · ( 1 D , 1 2 k , f p ) } .
(4)
G 3 : In this game, to breach the security of mutual authentication, A executes the queries of send ( S t a r t ,   U i ), send ( θ 1 , θ 2 ,   θ 3 ,   S j ), and send ( θ 5 ,   U i ) to C .
(a)
Send ( S t a r t ,   U i ) query: A selects two random numbers, n i 1 ,   n i 2     Z q , and calculates θ 1 = T n i 1 ( z ) ,  θ 2 = E T n i 1 A s j ( P I D i ,   n i 2 ,   T 1 ) ,  θ 3 = h ( C i j n i 2 T 1 S I D j P I D i ) . Then, the query answers θ 1 , θ 2 ,   θ 3 .
(b)
Send ( θ 1 , θ 2 ,   θ 3 ,   S j ) query: Compute P I D i ,   n i 2 ,   T 1 = D T a s j θ 1 ( θ 2 ) , C i j = h ( P I D i K j ) . If θ 3     h ( C i j n i 2 T 1 S I D j P I D i ) ,  S j rejects the session; otherwise, S j generates a random number n j and calculates θ 4 =   T n j ( z ) ,    θ 5 = E n i 2 ( n i 2 ,   θ 4 ,   T 2 ,   S K i j )   S K j i = h ( T n j ( θ 1 ) P I D i S I D j T 1 T 2 ) . Afterwards, the query responds with θ 5 .
(c)
Send ( θ 5 ,   U i ) query: Compute n i 2 ,   θ 4 ,   T 2 ,   S K j i = D n i 2 ( θ 5 ) . U i checks the freshness of T 2 and the validity of n i 2 . Then, U i computes S K = h ( T n i 1 ( θ 4 ) P I D i S I D j T 1 T 2 ) . If S K j i   S K U i terminates the session; otherwise U i   S K i j = S K = h ( T n i 1 ( θ 4 ) P I D i S I D j T 1 T 2 )  =  S K j i .
Assume that the adversary A tries to generate the false value θ 1 = T n i 1 z ,   θ 2 = E T n i 1 A s j P I D i ,   n i 2 ,   T 1 ,   θ 3 = h ( C i j n i 2 T 1 S I D j P I D i ) . This game G 3 is indistinguishable from the previous game G 2 , except when S j refuses a valid θ 1 , θ 2 ,   θ 3 or U i refuses a valid θ 5 . Therefore, we have
Pr S 3 Pr S 2 q s 2 l .
(5)
G 4 : In this game, A tries to guess the S K i j . If A tries to compute the session key S K i j = h ( T n i 1 ( T n j ( z ) ) P I D i S I D j T 1 T 2 ) , the CDH problem must be solved for the instance θ 1 , θ 2 ,   θ 3 within the polynomial-time bound t = t + ( q s + q e ) · T e p , where T 2 = C D H T n i 1 ( z ) ,   T n j ( z ) = T n i 1 ( T n j ( z ) ) , since { n i 1 ,   n j } are randomly chosen from Z q uniformly, and A either implements the execute query or send query.
Therefore, we obtain
| Pr [ S 4 ]   Pr   [ S 3 ] |     q h q s + q e 2 E x p A C D H ( t ) .
If A employs a private oracle h ( · ) , then C seeks the valid value in L h i and conveys it to A . Otherwise, C sends a random bit string s t     { 0 ,   1 } l . A tries to guess a bit b   { 0 ,   1 } , and the probability of successfully guessing b is not more than 1 2 . Therefore, we obtain
Pr [ S 4 ] = 1 2 .
Finally, we add (1)–(7) and have
E x p I I A K A t   q h 2 2 l + q s + q e 2 2 l + 2 q s · max 1 D , 1 2 k , f p + q s 2 l 1 + 2 q h · q s + q e 2 E x p A C D H ( t ) .

7.2. Informal Security Analysis

(1)
Perfect Forward Secrecy
This feature means that even if the password and biometrics of user are exposed to an adversary, all prior session keys still remain secure. We make the assumption that all private keys K j , a s j of the server and { I D i , P W i , B i o i } of the user are compromised, and the adversary obtains { P P I D i ,   A i ,   P C i j , c i , P U F · ,   n 0 ,   h · , τ i ,   R e p ( · ) } , which is stored in the smart card. Then, the adversary still cannot acquire the P I D i due to the property of the PUF. Moreover, because the session key is S K i j = h ( T n j ( θ 1 ) P I D i S I D j T 1 T 2 ) , even if an adversary can know all the long-term keys used in this protocol, it is computationally infeasible for the adversary to calculate T n j ( T n i 1 ( z ) ) because of the intractability of the Computational Diffie–Hellman Problem (CDHP).
(2)
Known-Key Security
This property means that the adversary cannot compute the next session key, even if he/she has obtained some previous session keys. To be specific, the session key is variable in our scheme due to the random number { n i 1 , n i 2 ,   n j } . Therefore, the adversary cannot know any useful information and cannot compute the next session key, even if they can acquire the session key.
(3)
Session Key Secrecy
Based on our protocol, the user and the server can negotiate a session key for later communication when they finish the mutual authentication and key agreement phase. The session key will be S K i j = h ( T n i 1 ( T n j ( z ) ) P I D i S I D j T 1 T 2 ) = h ( T n j ( T n i 1 ( z ) ) P I D i S I D j T 1 T 2 ) = S K j i .
(4)
User Anonymity and Untraceability
In our scheme, although the authentication request message { θ 1 , θ 2 , θ 3 } includes the user’s pseudoidentity P I D i , the adversary cannot obtain the P I D i because of the unknown encryption key T n i 1 A s j . Specifically, the user computes θ 1 = T n i 1 z , θ 2 = E T n i 1 A s j P I D i , n i 2 , T 1 , θ 3 = h C i j n i 2 T 1 S I D j P I D i . It is clear that the user’s identity P I D i is encrypted by a key negotiate between the user and the server. Moreover, the R C computes P I D i = E x I D i t i , where t i is the registration time. As a result, the user is anonymous to the server and adversary.
In addition, the random numbers n i 1 , n i 2 are different in each session, so the authentication request message { θ 1 ,   θ 2 ,   θ 3 } is also different in each session. So, our scheme achieves untraceability.
(5)
Replay Attack
In our scheme, three random numbers { n i 1 ,     n i 2 ,   n j } are utilized to resist the replay attack. Therefore, even if an adversary replays the message { θ 1 ,   θ 2 ,   θ 3 }, they cannot calculate the session key without knowing the random numbers { n i 1 ,     n i 2 ,   n j } .
(6)
Offline Identity/Password Guessing Attacks
Because the user’s identity and password is included in A i = h I D i P W i σ i   m o d   n , n   ( 2 4 ,   2 8 ) , if an adversary obtains all the information stored in the device, obtains the user’s biometric information, and guesses ( I D i ,   P W i ) to satisfy A i = h I D i P W i σ i   m o d   n , n   ( 2 4 ,   2 8 ) , there are D p w × | D i d | / n     2 32 candidates for the ( I D i ,   P W i ) pair when n = 256. Moreover, the adversary cannot know which pair is right due to the property of the PUF.
(7)
Three-Factor Secrecy
If an adversary can know the user’s biometric information B i o i and all the information stored on the device, he/she cannot guess the correct ( I D i ,   P W i ) pair. If an adversary can know the user’s biometric information B i o i and password, he/she cannot know the { P I D i ,   C i j } from the authentication messages. If an adversary can know the password and all the information stored in the device, he/she cannot know the user’s biometric information B i o i .
(8)
Device Lost Attack
M D i of U i stores { P P I D i , A i , P C i j , c i , P U F · , n 0 , h · , τ i , R e p ( · ) } , where A i = h I D i P W i σ i m o d   n , R i = P U F c i , P C i j = C i j h ( σ i I D i P W i R i j ) , P P I D i = P I D i h ( R i P W i I D i σ i j ) . So, an adversary cannot obtain { P I D i , C i j , P C i j } due to the property of the PUF. Therefore, according to above analysis, we can know that an adversary can’t obtain any valuable information to launch attacks even if he/she gets the information stored in device.
(9)
User/Server Impersonation Attacks
Suppose an adversary wants to impersonate the user to access the server; however, they cannot forge the valid message { θ 1 ,   θ 2 ,   θ 3 }, because they cannot know { P I D i , C i j , P C i j }, which are protected by the PUF.
Suppose an adversary wants to impersonate the server to pass the authentication by the user, however, they cannot forge the valid message θ 5 . Moreover, the adversary does not know the secret key a s j of the server, so the secret message θ 2 cannot be decrypted. So the adversary cannot obtain { P I D i ,   n i 2 ,   T 1 } and cannot forge a session key.
(10)
Man-in-the-Middle Attack
Our scheme achieves trustworthy mutual authentication between U i and S j , and any adversary can neither impersonate users nor servers. So, our scheme can resist man-in-the-middle attacks.
(11)
Stolen-Verifier Attack/Physical Capturing Attacks
Because the important information is stored in the user’s device and the servers, and they are all protected by the PUF, our scheme can resist stolen-verifier attacks and physical capturing attacks.

8. Performance Analysis

In Table 2, we present a comparison of the security features between our scheme and some related multiserver schemes [11,12,23,31,33,34].
We also simulated the computation cost in the environment of Intel Pentium4 2600 MHz processor with 1024 MB RAM. Table 3 displays the execution time for different operations. Table 4 shows the comparison of computation costs between ours and related protocols. The computation cost of bitwise operation like XOR is negligible.
We focus on the mutual authentication and key agreement phase because the server and user registration phase executes only once. In terms of the mutual authentication and key agreement phase, our scheme’s computation cost for a user is 86.56 ms, and it is 85.56 ms for a server. According to Table 4, it is obvious that our authentication scheme costs less than [23,31,33,34]. Our scheme’s computation costs are more than [11,12], but this is acceptable because our scheme has stronger security.
It is assumed that the output of hash function H ( · ) is 160 bits (SHA-1 hash function), the block size of symmetric encryption/decryption (AES) is 128 bits, the elliptic curve point is 320 bits, and the identity, random number, timestamp, and other parameters is 128 bits. We focus on the mutual authentication and key agreement phase because the server and user registration phase executes only once. During the mutual authentication and key agreement phase, only two messages, { θ 1 ,   θ 2 ,   θ 3 } and { θ 5 } , are transmitted in our scheme. To be specific, θ 1 = T n i 1 z ,   θ 2 = E T n i 1 A s j ( P I D i ,   n i 2 ,   T 1 ) , θ 3 = h ( C i j n i 2 T 1 S I D j P I D i ) , and θ 5 = E n i 2 ( n i 2 ,   θ 4 ,   T 2 ,   S K j i ) . The length of two interactive messages is (128 + 3 × 128 + 160) + 128 × ((128 + 128 + 128 + 160)/128) = 1312.

9. Conclusions

We have shown that Yu et al.’s three-factor multiserver authentication scheme has several security flaws, and we designed a new three-factor lightweight authentication based on Chebyshev’s chaotic map and the PUF. We analyzed our authentication scheme through the random oracle model and proved our scheme is secure. Furthermore, our scheme eliminates the requirement for RC during mutual authentication and only requires a one-time mutual interaction. Therefore, our scheme is more efficient and practical in multiserver environments, especially for resource-restrained mobile devices.

Author Contributions

Y.Z., designing, experimentation, writing, and security proof; Q.X., conceptualization, methodology, validation, review, editing, revise, funding. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Natural Science Foundation of China (Grant No. U21A20466), and the Hangzhou Joint Fund of the Zhejiang Provincial Natural Science Foundation of China (Grant No. LHZSZ24F020002).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Celik, A.; Romdhane, I.; Kaddoum, G.; Eltawil, A.M. A Top-Down Survey on Optical Wireless Communications for the Internet of Things. IEEE Commun. Surv. Tutor. 2023, 25, 1–45. [Google Scholar] [CrossRef]
  2. Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 2489–2520. [Google Scholar] [CrossRef]
  3. Gai, K.; Guo, J.; Zhu, L.; Yu, S. Blockchain Meets Cloud Computing: A Survey. IEEE Commun. Surv. Tutor. 2020, 22, 2009–2030. [Google Scholar] [CrossRef]
  4. Schlette, D.; Caselli, M.; Pernul, G. A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective. IEEE Commun. Surv. Tutor. 2021, 23, 2525–2556. [Google Scholar] [CrossRef]
  5. Rawal, B.S.; Berman, L.; Ramcharan, H. Multi-client/Multi-server split architecture. In Proceedings of the The International Conference on Information Networking 2013 (ICOIN), Bangkok, Thailand, 27–30 January 2013; Volume 201, pp. 696–701. [Google Scholar]
  6. Ul Haq, I.; Wang, J.; Zhu, Y.; Maqbool, S. A survey of authenticated key agreement protocols for multi-server architecture. J. Inf. Secur. Appl. 2020, 55, 102639. [Google Scholar]
  7. Lee, T.F. Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf. Sci. 2015, 290, 63–71. [Google Scholar] [CrossRef]
  8. Lu, Y.; Li, L.; Peng, H.; Xie, D.; Yang, Y. Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. J. Med. Syst. 2015, 39, 65. [Google Scholar] [CrossRef]
  9. Kumari, S.; Li, X.; Wu, F.; Das, A.K.; Arshad, H.; Khan, M.K. A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comp. Syst. 2016, 63, 56–75. [Google Scholar] [CrossRef]
  10. Abbasinezhad-Mood, D.; Nikooghadam, M. Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps. IEEE Trans. Industr. Inform. 2018, 14, 4815–4828. [Google Scholar] [CrossRef]
  11. Chatterjee, S.; Roy, S.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Vasilakos, A.V. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment. IEEE Trans. Depend. Secure 2018, 15, 824–839. [Google Scholar] [CrossRef]
  12. Yu, Y.; Taylor, O.; Li, R.; Sunagawa, B. An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment. Mathematics 2021, 9, 798. [Google Scholar] [CrossRef]
  13. He, D.; Bu, J.; Chan, S.; Chen, C.; Yin, M. Privacy-Preserving Universal Authentication Protocol for Wireless Communications. IEEE Trans. Wirel. Commun. 2011, 10, 431–436. [Google Scholar] [CrossRef]
  14. Tsai, J.L.; Lo, N.W.; Wu, T.C. Novel Anonymous Authentication Scheme Using Smart Cards. IEEE Trans. Industr. Inform. 2013, 9, 2004–2013. [Google Scholar] [CrossRef]
  15. Huang, X.; Chen, X.; Li, J.; Xiang, Y.; Xu, L. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parall. Distr. 2014, 25, 1767–1775. [Google Scholar] [CrossRef]
  16. Wang, D.; He, D.; Wang, P.; Chu, C.H. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE Trans. Depend. Secure 2015, 12, 428–442. [Google Scholar] [CrossRef]
  17. Li, L.H.; Lin, L.C.; Hwang, M.S. A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural. Networ. 2001, 12, 1498–1504. [Google Scholar]
  18. Zhang, Y.; Xu, C.; Li, H.; Yang, K.; Cheng, N.; Shen, X. PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage. IEEE Trans. Mobile. Comput. 2021, 20, 2297–2312. [Google Scholar] [CrossRef]
  19. He, D.; Wang, D. Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Syst. J. 2015, 9, 816–823. [Google Scholar] [CrossRef]
  20. Odelu, V.; Das, A.K.; Goswami, A. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards. IEEE Trans. Inf. Foren. Sec. 2015, 10, 1953–1966. [Google Scholar] [CrossRef]
  21. Zhang, M.; Zhang, J.; Tan, W. Remote three-factor authentication protocol with strong robustness for multi-server environment. China Commun. 2017, 14, 126–136. [Google Scholar] [CrossRef]
  22. Sudhakar, T.; Natarajan, V.; Gopinath, M.; Saranyadevi, J. An Enhanced Authentication Protocol for Multi-Server Environment Using Password and Smart Card. Wirel. Pers. Commun. 2020, 115, 2779–2803. [Google Scholar] [CrossRef]
  23. Cho, Y.; Oh, J.; Kwon, D.; Son, S.; Yu, S.; Park, Y.; Park, Y. A Secure Three-Factor Authentication Protocol for E-Governance System Based on Multiserver Environments. IEEE Access 2022, 10, 74351–74365. [Google Scholar] [CrossRef]
  24. Herder, C.; Yu, M.D.; Koushanfar, F.; Devadas, S. Physical Unclonable Functions and Applications: A Tutorial. Proc. IEEE 2014, 102, 1126–1141. [Google Scholar] [CrossRef]
  25. Che, W.; Saqib, F.; Plusquellic, J. PUF-Based Authentication. In Proceedings of the 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA, 2–6 November 2015; pp. 337–344. [Google Scholar]
  26. Wang, W.; Chen, Q.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet Things 2022, 9, 8883–8891. [Google Scholar] [CrossRef]
  27. Gu, C.; Chang, C.H.; Liu, W.; Yu, S.; Ma, Q.; O’neill, M. A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication. In Proceedings of the 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Xi’an, China, 16–17 December 2019; pp. 1–6. [Google Scholar]
  28. Zhou, X.; Wang, S.; Wen, K.; Hu, B.; Tan, X.; Xie, Q. Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare. IEEE Internet Things 2023, 1. [Google Scholar] [CrossRef]
  29. Zhang, H.; Bian, W.; Jie, B.; Xu, D.; Zhao, J. A Complete User Authentication and Key Agreement Scheme Using Cancelable Biometrics and PUF in Multi-Server Environment. IEEE Trans. Inf. Forensics Secur. 2021, 16, 5413–5428. [Google Scholar] [CrossRef]
  30. He, D.; Zeadally, S.; Kumar, N.; Wu, W. Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2052–2064. [Google Scholar] [CrossRef]
  31. Ying, B.; Nayak, A. Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography. J. Netw. Comput. Appl. 2019, 131, 66–74. [Google Scholar] [CrossRef]
  32. Ul haq, I.; Wang, J.; Zhu, Y. Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. J. Netw. Comput. Appl. 2020, 161, 102660. [Google Scholar] [CrossRef]
  33. Xiong, L.; Li, F.; He, M.; Liu, Z.; Peng, T. An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services. IEEE Trans. Cloud Comput. 2022, 10, 2309–2323. [Google Scholar] [CrossRef]
  34. Soni, P.; Pradhan, J.; Pal, A.K.; Islam, S.H. Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system. IEEE Trans. Ind. Inform. 2023, 19, 830–840. [Google Scholar] [CrossRef]
  35. Kocarev, L.; Tasev, Z. Public-key encryption based on Chebyshev maps. In Proceedings of the International Symposium on Circuits and Systems, ISCAS ’03, Bangkok, Thailand, 25–28 May 2003; Volume 3, pp. 28–31. [Google Scholar]
  36. Zhang, L. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 2008, 37, 669–674. [Google Scholar] [CrossRef]
  37. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Proceedings of the Advances in Cryptology—EUROCRYPT 2004, Interlaken, Switzerland, 2–6 May 2004; Cachin, C., Camenisch, J.L., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
  38. Gao, Y.; Al-Sarawi, S.F.; Abbott, D. Physical unclonable functions. Nat. Electron. 2020, 3, 81–91. [Google Scholar] [CrossRef]
  39. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inform. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
Figure 1. Network model of a multiserver environment.
Figure 1. Network model of a multiserver environment.
Mathematics 12 00079 g001
Figure 2. Sever registration phase.
Figure 2. Sever registration phase.
Mathematics 12 00079 g002
Figure 3. User registration phase.
Figure 3. User registration phase.
Mathematics 12 00079 g003
Figure 4. Mutual authentication and key agreement.
Figure 4. Mutual authentication and key agreement.
Mathematics 12 00079 g004
Table 1. Notations used in this paper.
Table 1. Notations used in this paper.
SymbolsDescriptions
h ( · ) One-way hash function
B H ( · ) Biometric hash function
T x ( · ) Chebyshev’s chaotic map polynomial
G e n · , R e p · The generation and reproduction function of a fuzzy extractor
P U F ( · ) Physical Unclonable Function
x , y Private key of R C
A s j Public key of S j
K j , a s j Private key of S j
I D i Identification of U i
S I D j Identification of S j
P W i Password of U i
B i o i Biometric information of U i
E ( · ) / D ( · ) Symmetric encryption/decryption
S C i Smart card of U i
S K i j Session key between U i and S j
Bitwise XOR operation
String concatenation operation
m o d Modulus operation
Table 2. Security features comparison.
Table 2. Security features comparison.
Attributes/Attacks[11][12][23][31][33][34]Ours
Perfect forward secrecy
User anonymity
Untraceability xx x
Known key security
Replay attack
Device lost attack
User impersonation attackxx xxx
Server impersonation attack xx x
Offline identity/password guessing attack x
Man-in-the-middle attack x x
Stolen-verifier attack xx
N-factor secrecyxxxxxx
: can resist the attack or achieve the attribute; x: cannot resist the attack or achieve the attribute.
Table 3. Execution time of cryptographic operations.
Table 3. Execution time of cryptographic operations.
TermOperationTime (in Microseconds)
T H One-way hash function0.5
T E / D Symmetric encryption/ decryption8.7
T E C C Point multiplication on elliptic curve63.075
T C H T n x ( m o d   p ) in a Chebyshev polynomial21.01
T B H A bio-hashing operation 21.02
T B P A bilinear paring operation327.12
T E X P An exponentiation operation22.49
Table 4. Comparison of Computation Costs.
Table 4. Comparison of Computation Costs.
ProtocolUserServer
[11] 10 T H + 3 T C H + 2 T e / d     85.43 6 T H + 3 T C H + 2 T e / d   83.43
[12] 10 T H + 2 T C H + T B H 68.04 8 T H + 2 T C H   46.02
[23]8 T H + 4 T E C C   256.34 T H + 4 T E C C   254.3
[31]7 T H + 5 T E C C   318.875 4 T H + 5 T E C C   317.375
[33]8 T H + 2 T E C C + 2TEXP + TBP  502.25 8 T H + 2 T E C C + 2TEXP + TBP  502.25
[34]11 T H + 6 T E C C   383.956 T H + 6 T E C C   381.45
Ours 5 T H + 2 T C H + 2 T e / d   86.56 3 T H + 2 T C H + 2 T e / d   85.56
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xie, Q.; Zhao, Y. Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures. Mathematics 2024, 12, 79. https://doi.org/10.3390/math12010079

AMA Style

Xie Q, Zhao Y. Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures. Mathematics. 2024; 12(1):79. https://doi.org/10.3390/math12010079

Chicago/Turabian Style

Xie, Qi, and Yuanyuan Zhao. 2024. "Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures" Mathematics 12, no. 1: 79. https://doi.org/10.3390/math12010079

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop