Enhanced Three-Factor Security Protocol For Consumer USB Mass Storage Devices
Enhanced Three-Factor Security Protocol For Consumer USB Mass Storage Devices
Accepted Version
It is advisable to refer to the publisher’s version if you intend to cite from the
work. See Guidance on citing .
Publisher: IEEE
www.reading.ac.uk/centaur
CentAUR
Central Archive at the University of Reading
Reading’s research outputs online
Full Text of article
Title: Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices
Authors:
Debiao He, School of Mathematics and Statistics, Wuhan University, Wuhan, China
(e-mail: hedebiao@163.com).
This work was supported by a 2013 Research Grant from Sangmyung University, Republic of Korea.
Abstract
The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral
connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer
USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB
MSDs has been prohibited in many commercial and everyday environments primarily due to security
concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is
to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor
control protocol that now makes it secure under many types of attacks including the password guessing
attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a
rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this
new security protocol for consumer USB MSDs.
Index Terms
1
I. Introduction
The Universal Serial Bus (USB) is a ubiquitous interface standard being widely used for connecting
storage to consumer devices [1]. Because of its convenience and ease of connectivity, the USB port has
become an essential component of consumer electronics devices such as flash disks, keyboards, cell
phones, chargers, speakers, and printers. However, the USB interface has the following three weaknesses
when it is used for consumer storage devices [2]: (1) anyone (e.g., an unauthorized user) could read or
steal confidential information easily since the information is stored in plaintext format; and (2) an
adversary could intercept or attack the transmitted information since the transmit channel between the
device and the computer is not secure. Therefore, despite their practicality, USB Mass Storage Devices
(MSDs) have been prohibited in an enormous number of environments. To solve these problems, and
extend the applications of USB consumer storage devices, an authentication protocol can be
implemented to ensure secure communications between the device and the computer.
Ever since Lamport proposed the first authentication protocol [2], many authentication protocols have
been proposed for different applications. Hwang and Li [3] proposed an authentication protocol using a
smart card. However, their protocol could not withstand the masquerade attack. To improve security, Ku
and Chen [4] proposed an improved authentication protocol using a smart card. Later, Yoon, Ryu and
Yoo [5] found that Ku and Chen’s improved authentication protocol was however vulnerable to the
parallel session attack, and subsequently proposed a new authentication protocol using a smart card, but
Hsiang and Shih [6] later demonstrated that it was vulnerable to three kinds of attacks. Hsiang and Shih
proposed their new authentication protocol using a smart card; however, Shim [7] found that Hsiang and
Shih’s protocol was vulnerable to the off-line password guessing attack.
Kim and Hong [8] proposed a multimodal biometric authentication protocol that employed teeth, image
and voice in mobile environments. To improve performance, Kim, Chung and Hong [9], and Lee, Kim
and Cho [10] proposed two new protocols that all used person specific authentication using personal
biometric characteristics such as face, teeth, and voice. However, all these protocols are not ideally
suitable for USB MSDs because their stored information can easily be read out or require significant
local complex computations.
To protect the privacy of a file transferred to a storage device, Yang, Wu and Chiu [11] proposed the
first secure control protocol using the Schnorr signature scheme [12]. However, Chen, Qin and Yu [13]
indicated that Yang et al.’s protocol [11] was vulnerable to the forge and replay attacks. Besides, Lee,
Chen and Wu [14] found that the performance of Yang et al. protocol [11] was computationally heavy
due to significant modular exponentiation operations. To solve those problems, Lee et al. [14] proposed
a three-factor authentication protocol based on Elliptic Curve Cryptosystem (ECC) that requires the
password, smart card, and biometric characteristic for authentication.
Compared with the use of only password, biometric keys have the following advantages [15]:
1) Biometric keys cannot be lost or forgotten;
2) Biometric keys are very difficult to copy or share;
3) Biometric keys are extremely hard to forge or distribute;
4) Biometric keys cannot be guessed easily.
Compared with the traditional public key cryptosystem, the ECC can provide better performance because
it can achieve the same security level using a smaller key size. For example, the 160-bit ECC and 1024-
bit from the popular Rivest–Shamir–Adleman (RSA) cryptosystem have the same level of security [16].
Therefore, Lee et al. protocol [14] was previously considered to be more suitable for USB consumer
2
storage devices. However, this paper will demonstrate that the protocol is vulnerable to the password
guessing attack, the Denial-of-Service (DoS) attack, and the replay attack.
In this paper, an enhanced three-factor security protocol is introduced that removes the shortcomings of
past three-factor security protocols. Detailed operations of the new protocol are provided with
comprehensive security analysis that proves the robustness of the protocol against various attacks.
The organization of this paper is as follows. Section II gives a review of the three-factor authentication
protocol followed by its security issues discussed in Section III. Section IV introduces the proposed
security protocol as part of this work. The protocol’s immunity from various attacks and other related
features is analyzed in Section V. Section VI analyzes the proposed protocol’s computational cost.
Section VII concludes the paper.
There are three phases in Lee et al. protocol [14]: (1) the registration phase; (2) the verification and data
encryption phase; and (3) the key agreement phase. The details of these phases are described in this
section. Notations used in this paper are first defined as follows:
3
A. System Environment
To manage security for a USB MSD, AS restricts the data transfers over the USB interface. U is allowed
to transfer data via the USB interface only when U could pass AS’s authentication. When U wishes to
transfer a file to a storage device via the USB interface, U is required to input their username, password
and biometric characteristic to verify legitimacy.
When U is successfully authenticated, a shared session key is generated between U and AS. Then, the
session key will be used to encrypt the files transferred via the USB interface. When U decrypts the files
on the storage devices, U must do the same authentication and generate the same session key for the
original file. Every filename and user’s identity will have a session key and different files or users’
identity have different session keys. To ensure system security, the temporarily stored session key will be
deleted after encrypting or decrypting the file. Lee et al.’s protocol [14] has the following three
characteristics: (1) only authorized users can access the USB consumer storage devices; (2) files taken
from the storage devices cannot be decrypted without the session key; and (3) other legal users cannot
decrypt a legal classified file even if it is copied to their storage device. Therefore the original file is
secure.
Lee et al.’s three-factor authentication protocol [14] is illustrated in Fig. 1. U inserts their storage device
into a client terminal and inputs their password, identity and biometric signature (phase 1). Mutual
authentication is then executed between U and AS (phase 2). U obtains a session key from AS if they are
successfully authenticated (phase 3). With this key, U can store an encrypted file on the storage device.
B. Registration Phase
When U wants to be a legal user of AS, then U has to be registered through the following steps:
1) U inputs their biometric characteristic BU through a specified biometric device and provides a
password, pwU and identity IDU . The system sends {IDU , h( pwU || BU )} to AS.
2) Upon receiving {IDU , h( pwU || BU )} , AS computes eU h(h( IDU || x) || h( pwU || BU )) and
sU h( IDU || x) h( pwU || BU ) , where x is AS’s secret key. Then AS stores {eU , sU } in U’s USB
MSD and delivers it to U securely.
3) Upon receiving data from the storage device, U computes BPWU BU h( pwU ) and stores it in
their storage device. Accordingly, the information {eU , sU , BPWU } is stored in the storage device.
4
C. Verification and Data Encryption Phase
When U accesses the storage device, the following steps are executed between U and AS for mutual
authentication:
1) U inserts their USB MSD into the client terminal, and inputs a password pwU , identity IDU and
biometric characteristic BU . The device then computes BU BPWU h( pwU ) and checks BU and
BU are equal. If they are not equal, the device rejects U’s request; otherwise, the device computes
wU sU h( pwU || BU ) and checks if h( wU || h( pwU || BU )) and eU are equal. If they are not equal, the
device again rejects U’s request; otherwise, the device generates a random number a Z q* ,
computes aP and h( IDU || aP || wU ) , where Z q* denotes the set {1, 2,…, q 1} . The message
m1 {IDU , aP, Fn , } is sent to AS.
2) Upon receiving the message m1, AS first checks the user’s identity. If it is not valid then AS rejects
the request; otherwise, AS computes wU h( IDU || x) and checks if h( IDU || aP || wU ) and are equal.
If they are not equal, AS rejects the request; otherwise, AS generates a random number b Z q* and
computes bP , sk b(aP) abP , n h( x || Fn ) and h( IDU || sk || bP || n || wU ) . Then, AS sends the
message m2 {bP, Esk (n), } to U.
3) Upon receiving the message m2, U computes sk a(bP) abP and uses it to decrypt Esk (n) . Then,
U obtains n h( x || Fn ) . U then checks if h( IDU || sk || bP || n || wU ) and are equal. If they are equal
then U has been successfully authenticated.
After completing mutual authentication, U computes an encrypted key, K h( IDU || n) . When U wishes to
access a file on the USB MSD, U uses the key to encrypt a file as EK (file) to ensure the security of the
file on the storage device. If U needs to decrypt the file, U must follow the same steps to decrypt the file
as DK ( EK (file)) on the device.
Assume that A has obtained U’s USB storage device. Then, A could read the stored information
{eU , sU , BPWU } from the device, where eU h(h( IDU || x) || h( pwU || BU )) , sU h( IDU || x) h( pwU || BU ) and
BPWU BU h( pwU ) . However, A could obtain the password through the following steps:
1) A guesses a password pwU from a directory, D.
2) A computes BU BPWU h( pwU ) and wU sU h( pwU || BU ) .
3) A checks if h( wU || h( pwU || BU )) and eU are equal. If they are equal, pwU is the correct password;
otherwise, A repeats steps 1)-3) until the correct password is found.
With the found password and stored information BPWU BU h( pwU ) , A could generate a legal login
message like U normally does. Then, A could impersonate U to login to AS and obtain the secure data.
Therefore, the protocol [14] is vulnerable to the password guessing attack as specifically could be the
case where A has gained possession of U’s USB MSD this allowing A to do the attack.
5
B. Denial of Service (DoS) Attack
In step 1) of the verification and data encryption phase, U inserts their USB storage device into the client
terminal, and inputs their password pwU , identity IDU and biometric characteristic BU . The device then
computes BU BPWU h( pwU ) and checks if BU and BU are identical. If they are not equal, the device
rejects U’s request. However, it is known that the inputted biometric characteristic of the same person
can be somewhat different every time [17]. Then BU and BU are not equal and the device may reject U’s
valid request. Therefore, the protocol [14] is somewhat vulnerable to the DoS attack due to the
unrepeatability of biometric characteristic.
C. Replay Attack
Suppose A could control the communication channel between U and AS since messages are transmitted
via an insecure channel in the login and key agreement phase. Therefore, A could intercept, insert, delete,
or interpolate any messages at will. A could intercept a message m1 sent by U. Then, A could replay it to
AS. Although A cannot compute the session key, A is successful as long as AS accepts the login request.
Therefore, the protocol [14] is vulnerable to the replay attack.
This section proposes significant enhancements to the three-factor authentication protocol. Before the
proposed protocol operations are described, a fuzzy extractor [18] used in the proposed protocol is
defined as illustrated below:
Definition 1: - Metric Space [18]. A metric space is a set with a distance function
dis : R [0, ) which obeys various natural properties. One example of metric spaces is
the Hamming metric : =n is over some alphabet n (e.g., n {0,1} ) and dis(, ) is the number of
positions in which they differ.
Definition 2: - Statistic Distance [18]. Statistic Distance is the distance between two probability
1
distributions and and is denoted by SD( , ) | Pr[ v] Pr[ v] | .
2 v
Definition 3: - Entropy [18]. The min-entropy H ( ) of a random variable is log(max a Pr[ a]) .
A fuzzy extractor extracts a nearly random string from its biometric characteristic input in an
error-tolerant way. If the input changes but remains close to , then the extracted remains the same.
To assist in recovering from a biometric characteristic input , a fuzzy extractor outputs an auxiliary
string . However, remains uniformly random for a given . The fuzzy extractor is formally defined
as below:
Definition 4: - Fuzzy Extractor [18]. A ( , m, l , t, ) fuzzy extractor is given by two procedures, Gen and
Rep:
1) Gen is a probabilistic generation procedure, which on (biometric characteristic) input
outputs an “extracted” string {0,1}l and an auxiliary string . For any distribution W on of
min-entropy m, if , Gen(W ) , then SD( , , Ul , ) . Here, U l denotes the uniform
distribution on l-bit binary strings.
2) Rep is a deterministic reproduction procedure allowing to recover from the corresponding
6
auxiliary string and any vector close to : for all , satisfying dis(, ) t , if
, Gen(W ) , then Rep(, ) .
Like Lee et al. protocol [14], the proposed protocol in this paper also consists of the three phases, i.e.,
the registration phase, the verification and data encryption phase, and the key agreement phase. The
system environment of the proposed protocol is the same as Lee et al. protocol.
A. Registration phase
When U wants to be a legal user of AS, the following steps are executed:
1) U inputs their biometric characteristic BU through a suitable biometric device and provides their
password pwU and identity IDU . U then computes (U ,U ) Gen( BU ) and submits
{IDU , h( pwU || U )} to AS.
2) Upon receiving {IDU , h( pwU || U )} , AS computes eU h(h( IDU || x) || h( pwU || U )) and
sU h( IDU || x) h( pwU || U ) , where x is AS’s secret key. Then, AS stores {eU , sU } in U’s storage
device and delivers it to U securely.
3) Upon receiving the USB consumer storage device information, U computes BPWU U h( pwU )
and stores the result in the storage device. The storage device thus contains the information
{eU , sU , BPWU } .
When U wants to access the USB MSD, the following steps are executed between U and AS for mutual
authentication:
1) U inserts their USB storage device into the client USB port and inputs their password pwU ,
identity IDU and biometric characteristic BU . The device computes U BPWU h( pwU ) ,
U Rep( BU ,U ) , and wU sU h( pwU || U ) . Then, it checks if h( wU || h( pwU || U )) and eU are
equal. If they are not equal, the device rejects U’s request; otherwise, the device generates a
random number a Z q* , and then computes aP and h( IDU || aP || Fn || wU ) . The message
m1 {IDU , aP, Fn , } is then sent to AS.
2) Upon receiving the message m1, AS checks the user’s identity first. If it not true, AS rejects the
request; otherwise, AS computes wU h( IDU || x) and checks if h( IDU || aP || Fn || wU ) and are
equal. If they are not equal, AS rejects the request; otherwise, AS generates a random number
b Z q* and computes bP , sk b(aP) abP , n h( x || Fn ) and h("0" || IDU || aP || Fn || bP || n || sk || wU ) .
The AS then sends the message m2 {bP, Esk (n), } to U.
3) Upon receiving the message m2, U computes sk a(bP) abP and uses it to decrypt Esk (n) . Then,
U obtains n h( x || Fn ) and U checks if h("0" || IDU || aP || Fn || bP || n || sk || wU ) and are equal. If
they are not equal, U stops the session; otherwise, it is authenticated. Next, U computes
h("1" || IDU || aP || Fn || bP || n || sk || wU ) and sends the message m3 { } to AS.
4) Upon receiving the message m3, AS checks if and h("1" || IDU || aP || Fn || bP || n || sk || wU ) are equal.
If they are not equal, AS stops the session; otherwise, U is authenticated.
After completing mutual authentication, U computes an encrypted key K h( IDU || n) . When U wants to
7
access the USB MSD, U uses the key to encrypt a file as EK (file) to ensure the security of the file on the
storage device. If U needs to decrypt the file, then they must follow the same steps to decrypt the file as
DK ( EK (file)) on the storage device.
V. Security Analysis
In this section, the security of the proposed protocol is analyzed for USB consumer storage devices.
Burrows–Abadi–Needham (BAN) logic [19], [20] has been used to demonstrate that the proposed
protocol provides secure authentication. Then, the security assessment is performed to test whether the
proposed protocol can overcome weaknesses in past security algorithms.
8
According to the analytic procedures of the BAN logic, the proposed protocol must then satisfy the
following test goals in order to prove the system is secure:
Goal 1: U | (U K
AS ) ;
Goal 2: U | AS | (U
K
AS )
Goal 3: AS | (U AS )
K
Goal 4: AS | U | (U
K
AS )
Goal 5: U | (U sk
AS )
Goal 6: U | AS | (U sk
AS )
Goal 7: AS | (U AS )
sk
Goal 8: AS | U | (U sk
AS )
Msg 1. U AS :
( IDU , aP, Fn )U
h ( IDU ||x )
AS
Msg 2. AS U :
("0", aP, bP,U
K
AS ,U
sk
AS )U
h ( IDU ||x )
AS
Msg 3. U S :
("1", aP, bP,U
K
AS ,U
sk
AS )U
h ( IDU ||x )
AS
Second, the following assumptions about the initial state of the protocol are made to analyze the
proposed protocol:
A1 : U | #(aP) ;
A2 : AS | #(bP) ;
A3 : U | (U
h ( IDU ||x )
AS ) ;
A4 : AS | (U
h ( IDU ||x )
AS ) ;
A5 : U | AS | (U
K
AS ) ;
A6 : AS | U | (U
K
AS ) ;
A7 : U | AS | (U
sk
AS ) ;
A8 : AS | U | (U
sk
AS ) ;
Third, the idealized form of the proposed protocol is analyzed based on the BAN logic rules and the
assumptions. The main proofs are stated as follows:
9
According to A3 , the message-meaning rule is applied:
S4 : U | AS |~ ("0", aP, bP,U
K
AS ,U
sk
AS )
According to S12 , the BAN logic rule is applied to break conjunctions to produce:
S13 : AS | U (U K
AS ) Goal 3
S14 : AS | U | (U AS )
sk
Goal 7
According to Goal 1 – Goal 8, both U and AS know that a session key sk abP and an encrypted key
K h( IDU || n) have successfully been shared between U and AS.
B. Security Assessment
Assume an adversary A has stolen the user U’s USB MSD. Then, they could read the stored information
{eU , sU , BPWU } from the device. A could guess a password pwU and compute U BPWU h( pwU ) .
However, A cannot compute the corresponding U without U’s biometric characteristic. Therefore, they
cannot verify the correctness of pwU . Therefore, the proposed protocol should withstand the password
10
guessing attack.
2) DoS attack
In the proposed protocol, the inputted biometric characteristic of the same person are also different every
time. However, the device can get the correct U through the fuzzy extractor algorithm. Therefore, U
can pass the device’s verification and the proposed algorithm thus withstands the DoS attack.
3) Replay attack
Suppose adversary A intercepts the message m1 sent by U and replays it back to AS. Without knowing
value wU , A cannot compute for a newly generated bP . Then, AS could determine the attack by
checking the correctness of . A may intercept the message m2 sent by AS and replay it to U. However,
U can identify the attack by checking the correctness of since a is generated for every session.
Therefore, the proposed algorithm should withstand the replay attack.
4) Stolen-verifier attack
In the proposed protocol, AS maintains no password table at all. Therefore, the proposed algorithm
should withstand the stolen-verifier attack.
5) Impersonation attack
Suppose an adversary A wants to impersonate U to AS. A could generate a random number a Z q* and
compute aP . However, A cannot compute since A does not know wU . Furthermore, AS can find the
attack by checking the correctness of . Suppose A intercepts the message m1 and wants to impersonate
U to AS, however in this case A cannot compute without the value wU . U can also identify the attack
by checking the correctness of . Therefore, the proposed protocol should withstand the impersonation
attack.
6) Mutual authentication:
The proposed protocol allows that only U knows U ’s secret key, wU h( IDU || x) , otherwise AS’s secret
key x could generate the legal message and . Then, U and AS can confirm m2 and m3 are sent by
AS and U by checking the correctness of and separately. The proposed protocol thus should provide
mutual authentication between U and AS.
7) Man-in-the-middle attack:
From the above description, it has been shown that the proposed protocol should provide mutual
authentication between U and AS, therefore by definition, the proposed algorithm should also withstand
the man-in-the-middle attack.
In this section, the proposed protocol is compared with Yang et al. protocol [11] and Lee et al. protocol
[14] in terms of relative computational cost. This work analyzed the target protocols [11], [14] and
explicitly divided the protocols’ operations in terms of crypto-operations. Then, the relative
11
computational times and the absolute times were subsequently calculated as before [14], [21]. Notations
are as follows:
TABLE I shows the relative cost comparisons for Yang et al. protocol, Lee et al. protocol, and the
proposed protocol in this paper. The total computational cost of the verification and data encryption
phase of Yang et al. protocol, Lee et al. protocol, and the proposed protocol are 10 Tme +5 Thash +2 Tsym ,
4 Tpm +9 Thash +2 Tsym and 4 Tpm +9 Thash +2 Tsym + T fe respectively. To be precise, the computational time of a
one-way hashing operation, a symmetric encryption/decryption operation, modular exponentiation
operation and an elliptic curve point relative multiplication operation is 0.00032 s, 0.0056 s, 0.0192 s and
0.0171 s respectively [14]. The total relative computational time of Yang et al. protocol, Lee et al.
protocol, and the proposed protocol are 0.20488 s, 0.08248 s and 0.09958 s, respectively. The proposed
protocol requires the fuzzy extractor that can be constructed from universal hash functions or error-
correcting codes requiring only lightweight operations [18]. It is here assumed that the time for executing
a fuzzy extractor is the same as that for executing an elliptic curve point multiplication at the most. Note
that the elliptic curve point multiplication is considered as a complicated and time-consuming operation
among the cryptographic operations.
The proposed protocol and Lee et al. protocol both show better computation performance than Yang et
al. protocol as expected; while at the same time the proposed protocol addresses the vulnerabilities in
Lee et al. protocol with a small extra computational cost. Hence, the proposed protocol is suitable for
practical applications in terms of security reliability and computational efficiency.
TABLE I
COMPUTATIONAL COST COMPARISONS
User Authentication Server Total
Yang et al. 4 Tme +3 Thash + 6 Tme +2 Thash + 10 Tme +5 Thash +
protocol [11] 1 Tsym 0.08336 1 Tsym 0.12144 2 Tsym 0.20488
VII. Conclusion
The three-factor authentication protocol based on Elliptic Curve Cryptosystem for USB consumer
storage devices has been shown to have significant advantages, but as presented in this paper, there were
still existing security vulnerability issues needed to be solved, specifically the password guessing attack,
the DoS attack and the replay attack. This paper has presented a significantly enhanced security protocol
to address previous weaknesses. The proposed protocol has been presented and rigorously analyzed in
12
terms of security and computational cost. As shown, the proposed protocol is robust against conceivable
attacks while at the same time having the same computational cost compared to the literature. The work
is ideal to be embedded in the firmware of consumer based USB Mass Storage Devices thus relieving the
user of extra security burdens and enabling the devices to be confidently used in the knowledge that the
data stored is secure.
REFERENCES
[1] M. Alzarouni, “The reality of risks from consented use of USB devices,” in Proc. 4th in Proc. 4th
Australian Information Security Management Conference, pp. 312-317, December 2006.
[2] C. Wu, W. Lee, and W. J. Tsaur, “A secure authentication scheme with anonymity for wireless
communications,” IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, Oct. 2008.
[3] M. S. Hwang, and L. H. Li, “A new remote user authentication scheme using smart cards,” IEEE
Trans. Consumer Electron., vol. 46, no. 1, pp. 28-30, Feb. 2000.
[4] W. C. Ku, and S. M. Chen, “Weaknesses and improvements of an efficient password based remote
user authentication scheme using smart cards,” IEEE Trans. Consumer Electron, vol. 50, no. 1, pp.
204-207, Feb. 2004.
[5] E. Yoon, E. Ryu, and K. Yoo, “Further improvement of an efficient password based remote user
authentication scheme using smart cards,” IEEE Trans. Consumer Electron, vol. 50, no. 2, pp. 612-
614, May 2004.
[6] H. C. Hsiang, and W. K. Shih “Weaknesses and improvements of the Yoon-Ryu-Yoo remote user
authentication scheme using smart cards,” Computer Communications, Elsevier, vol. 32, no. 4, pp.
649-652, Mar. 2009.
[7] K. -A. Shim, “Security flaws in three password-based remote user authentication schemes with smart
cards,” Cryptologia, Taylor and Francis, vol. 36, no. 1, pp. 62-69, Jan. 2012.
[8] D. -J. Kim, and K. -S. Hong, “Multimodal biometric authentication using teeth image and voice in
mobile environment,” IEEE Trans. Consumer Electron., vol. 54, no. 4, pp. 1790-1797, Nov. 2008.
[9] D. -J. Kim, K. -W. Chung, and K. -S. Hong, "Person authentication using face, teeth and voice
modalities for mobile device security", IEEE Trans. Consumer Electron, vol. 56, no. 4, pp. 2678-
2685, Nov. 2010.
[10] S. -H. Lee, D. -J. Kim, and J. -H. Cho, “Illumination-robust face recognition system based on
differential components,” IEEE Trans. Consumer Electron., vol. 58, no. 3, pp. 963-970, Aug. 2012.
[11] F. –Y. Yang, T. –D. Wu, and S. –H. Chiu, “A secure control protocol for USB mass storage
devices,” IEEE Trans. Consumer Electron., vol. 56, no. 4, pp. 2339-2343, Nov. 2010.
[12] C. Schnorr, “Efficient identification and signatures for smart cards,” Journal of Cryptology,
Springer, vol. 4, no. 3, pp. 161-174, 1991.
[13] B. Chen, C. Qin, and L. Yu, “A Secure Access Authentication Scheme for Removable Storage
Media,” Journal of Information & Computational Science, Binary Information Press, vol. 9, no. 15,
pp. 4353-4363, Nov. 2012.
[14] C. Lee, C. Chen, and P. Wu, “Three-factor control protocol based on elliptic curve cryptosystem for
universal serial bus mass storage devices,” IET Computers & Digital Techniques, vol. 7, no. 1, pp.
48-55, Jan. 2013.
[15] C. -T. Li, and M. -S. Hwang, “An efficient biometrics-based remote user authentication scheme
using smart cards,” Journal of Network and Computer Applications, Elsevier, vol. 33, no. 1, pp. 1-5,
Jan. 2010.
[16] D. Hankerson, S. Vanstone, and A. Menezes, “Guide to elliptic curve cryptography,” Lecture Notes
in Computer Science, 2004.
[17] A. Das, “Analysis and improvement on an efficient biometric-based remote user authentication
scheme using smart cards”, IET Information Security, vol. 5, no. 3, pp. 145-151, Sept. 2011.
13
[18] Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy Extractors: How to Generate Strong Keys from
Biometrics and Other Noisy Data,” in Proc. 2004 Int. Conf. Theory and Applications of
Cryptographic Techniques, Interlaken, Switzerland, in Lecture Notes in Computer Science, pp. 523-
540, 2004.
[19] M. Burrows, M. Abadi, and R. Needham, “A logic of authentication,” ACM Trans. Computer
Systems, vol. 8, no. 1, pp. 18-36, Feb. 1990.
[20] J.-H. Lee and J.-M. Bonnin, “HOTA: Handover Optimized Ticket-based Authentication in Network-
based Mobility Management,” Information Sciences, Elsevier, vol. 230, pp. 64-77, May 2013.
[21] B. Schneier, Applied cryptography protocols algorithms, 2nd ed., Wiley, 1996.
BIOGRAPHIES
Debiao He received the Ph.D. degree in applied mathematics from School of Mathematics
and Statistics, Wuhan University in 2009. He is currently a lecturer at Wuhan University,
China. His main research interests include cryptography and information security, in
particular, cryptographic protocols.
Neeraj Kumar received the Ph.D. in CSE from Shri Mata Vaishno Devi University,
Katra (India) and PDF from Coventry University, Coventry, UK. He is now an Assistant
Professor in the Department of Computer Science and Engineering, Thapar University,
Patiala, Punjab, India. He is a senior member of ACEEE and IACSIT. His research is
focused on mobile computing, parallel/distributed computing, multi-agent systems,
service oriented computing, routing and security issues in mobile ad hoc, sensor and mesh networks.
Jong-Hyouk Lee (M’07-SM’12) received the M.S. and Ph.D. degrees in Computer
Engineering from Sungkyunkwan University, Korea. He was a researcher at INRIA,
France and was an Assistant Professor at TELECOM Bretagne, France. He is now an
Assistant Professor at the Department of Computer Software Engineering, Sangmyung
University, Korea. His research interests include authentication, privacy, smart
networking technologies, and Internet mobility management.
Dr. Lee is an Associate Editor of Wiley Security and Communication Networks and the IEEE
TRANSACTIONS ON CONSUMER ELECTRONICS. He won the Best Paper Award at the IEEE WiMob 2012 and
was a tutorial speaker at the IEEE WCNC 2013.
14