Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing

Wenting Li,Ping Wang
DOI: https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-2
2019-01-01
Abstract:Nowadays, Edge Computing plays an important role in today's constantly increasing data-demanding services such as healthcare and augmented reality. To facilitate external users to enjoy remote data directly and securely from such kinds of environments, user authentication constitutes the most prevailing access control mechanism. Over the past decades, considerable efforts have been devoted to proposing secure and usable two-factor authentication schemes by making use of chaotic maps, yet most of the existing schemes are far from practical. In this work, we make an attempt towards improving this undesirable situation by reviewing two representative schemes presented by Kumari et al. and Li et al. and providing reasonable solving methods. We find that Kumari et al.'s scheme is confronted with verifier table issue, also cannot withstand smart card loss attack, impersonation attack and Li et al.'s scheme fails to realize the imperative goal of truly two-factor security and forward secrecy. Finally, we present some reasonable fixes for these identified weaknesses.
What problem does this paper attempt to address?