{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:31Z","timestamp":1762004911198},"reference-count":25,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2017,8]]},"abstract":"<jats:p>Many remote user authentication schemes have been designed and developed to establish secure and authorized communication between a user and server over an insecure channel. By employing a secure remote user authentication scheme, a user and server can authenticate each other and utilize advanced services. In 2015, Cao and Ge demonstrated that An\u2019s scheme is also vulnerable to several attacks and does not provide user anonymity. They also proposed an improved multi-factor biometric authentication scheme. However, we review and cryptanalyze Cao and Ge\u2019s scheme and demonstrate that their scheme fails in correctness and providing user anonymity and is vulnerable to ID guessing attack and server masquerading attack. To overcome these drawbacks, we propose a security-improved authentication scheme that provides a dynamic ID mechanism and better security functionalities. Then, we show that our proposed scheme is secure against various attacks and prove the security of the proposed scheme using BAN Logic.<\/jats:p>","DOI":"10.1177\/1550147717724308","type":"journal-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T13:14:14Z","timestamp":1501852454000},"page":"155014771772430","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":15,"title":["Security analysis and enhancements of an improved multi-factor biometric authentication scheme"],"prefix":"10.1177","volume":"13","author":[{"given":"YoHan","family":"Park","sequence":"first","affiliation":[{"name":"Division of IT Convergence, Korea Nazarene University, Korea, Republic"}]},{"given":"KiSung","family":"Park","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Kyungpook National University, Daegu, Korea, Republic"}]},{"given":"KyungKeun","family":"Lee","sequence":"additional","affiliation":[{"name":"Mobile Division, Samsung Electronics, Korea, Republic"}]},{"given":"Hwangjun","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Pohang University of Science and Technology (POSTECH), Korea, Republic"}]},{"given":"YoungHo","family":"Park","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Kyungpook National University, Daegu, Korea, Republic"}]}],"member":"179","published-online":{"date-parts":[[2017,8,4]]},"reference":[{"key":"bibr1-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.007"},{"key":"bibr2-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2946"},{"key":"bibr3-1550147717724308","first-page":"28","volume":"23","author":"Mishra D","year":"2015","journal-title":"J Inform Secur Appl"},{"key":"bibr4-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1145\/583800.583803"},{"key":"bibr5-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"bibr6-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1109\/30.920446"},{"key":"bibr7-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00415-7"},{"key":"bibr8-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0154-6"},{"key":"bibr9-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2676"},{"key":"bibr10-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1049\/el:20047658"},{"issue":"1","key":"bibr11-1550147717724308","first-page":"41","volume":"1","author":"Chang CC","year":"2010","journal-title":"Int J Intell Inform Process"},{"key":"bibr12-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0016-2"},{"key":"bibr13-1550147717724308","doi-asserted-by":"crossref","first-page":"1916","DOI":"10.1002\/sec.961","volume":"9","author":"Li X","year":"2016","journal-title":"Secur Commun Netw"},{"key":"bibr14-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"bibr15-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0125"},{"key":"bibr16-1550147717724308","first-page":"519723","volume":"2012","author":"An Y","year":"2012","journal-title":"BioMed Res Int"},{"key":"bibr17-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1010"},{"key":"bibr18-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0125"},{"key":"bibr19-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"bibr20-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"bibr21-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9902-7"},{"key":"bibr22-1550147717724308","first-page":"1168","volume-title":"Proceedings of the 2010 20th international conference on pattern recognition (ICPR)","author":"Belguechi R"},{"key":"bibr23-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.05.007"},{"key":"bibr24-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9912-5"},{"key":"bibr25-1550147717724308","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9948-1"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717724308","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147717724308","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717724308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:11:01Z","timestamp":1719360661000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147717724308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["10.1177\/1550147717724308"],"URL":"https:\/\/doi.org\/10.1177\/1550147717724308","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8]]}}}