Anonymous Key Agreement Protocol

The robustness of multi-server authentication is considered an important condition for the current paradigm of remote authentication. Recently, extensive research has been conducted to develop robust authentication protocols for the multi-server authentication environment. In this article, we offer an anonymous authentication scheme for multiple servers. Deficiencies in previous regulations will be taken into account in order to develop the proposed system with improved safety features. The analysis of performance evaluation and formal security is also described in this document using different systems. This analysis also shows that our schematic offers more security features. Experience. In this experiment, we begin to take an interest in active sessions. If signing a query is a valid signature for that active session, we simply complete the simulation and let the opponent win. As the user is honest in this session, the message is generated by the user. In addition, we interrupt the experience in which the collision occurs in editing haque functions and transcripts, so that the signature is valid if it is a signature for the random number.

The opponent wins the game in this experience if and only if a new signature is forged. The signature scheme used in our protocol is existentially intact against selected message attacks, so the opponent`s advantage in forging a signature is negligible for a new random number. It is clear that recently researchers are beginning to focus on user privacy in WSNs. Wu et al. [16] proposed an anonymous ECC-based authentication scheme for WSNs with formal proof of security. Jiang et al. [17] designed a three-factor anonymous authentication scheme for WSN. The security of their protocol is ensured by ProVerif. Wang et al. [20] have proposed a new authentication capable of withstanding all known attacks against WSN.

They are also studying the design principle of authentication schemes. They also designed a biometric authentication scheme and proved its security with the logic of Burrows-Abadi-Needham (BAN) [18]. Li et al. [19] proposed a three-factor anonymous authentication scheme for WSN. You use blurred engagement to manage the user`s biometric model. Amin R, Islam SH, Biswas G, Khan MK, Leng L, Kumar N (2016) Design of an authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42-62 Lee, C.C., Chen, S. D., Chen, C. L.

(2012). An encrypted three-year protocol for key exchange. Tech. Rep. A widespread mechanism for repelling these attacks is the use of digitally signed keys, which must be secured for integrity: if Bob`s key is signed by a trusted third party guarantor of his identity, Alice can have great confidence that a signed key she receives is not an attempt to intercept Eve. If Alice and Bob have an infrastructure with public keys, they can digitally sign a Diffie Hellman key or exchange a Diffie Hellman public key. These signed keys, sometimes signed by a certification body, are one of the primary mechanisms used for secure web data traffic (including DEE, SSL or Transport Layer Security protocols).