A Software Agent Enabled Biometric Security Algorithm For Secure File Access in Consumer Storage Devices
A Software Agent Enabled Biometric Security Algorithm For Secure File Access in Consumer Storage Devices
: A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices 53
Abstract—In order to resist unauthorized access, consumer the device may be lost or stolen by an adversary. If the
storage devices are typically protected using a low entropy confidential information is not protected, an adversary can
password. However, storage devices are not fully protected easily retrieve the stored information from the device memory.
against an adversary because the adversary can utilize an off-line However, the adversary faces a problem to retrieve the
dictionary attack to find the correct password and/or run an
existing algorithm for resetting the existing password. In
information from the store if the device is password protected.
addition, a password protected device may also be stolen or It is worth noting that a user’s password (typically low
misplaced allowing an adversary to easily retrieve all the stored entropy) cannot provide a strong secure system under a
confidential information from a removable storage device. In cryptographic dictionary attack. Indeed, many techniques are
order to protect the consumer’s confidential information that has currently available to guess the password to access the device.
been stored, this paper proposes a mutual authentication and key Mutual authentication and key agreement protocols are a
negotiation protocol that can be used to protect the confidential
popular paradigm in client-server environments to prevent
information in the device. The functionality of the protocol
enables the storage device to be secure against relevant security unauthorized access. In 1981, Lamport [1] first introduced the
attacks. A formal security analysis using Burrows-Abadi- secure communication client-server architecture and then
Needham (BAN) logic is presented to verify the presented numerous protocols [2]-[4] have been proposed for several
algorithm. In addition, a performance analysis of the proposed applications, including wireless sensor networks [5], medical
protocol reveals a significantly reduced communication overhead systems [6] and file security for USB based Mass Storage
compared to the relevant literature. Devices (USB MSD) [7]-[12]. In order to provide secure
access, authentication protocols play an important role.
Index Terms— Security Protocol, Biometric, Computer
System, BAN logic, File Secrecy Significant literature is now available to provide solutions
to protect confidential files stored in a USB MSD. Yang et al.
[7] first proposed a secure authentication protocol using the
I. INTRODUCTION Schnorr Signature to protect the information stored. However,
Chen et al. [8] argued that the protocol from Yang et al. [7]
C ONSUMER storage is commonly used to store and retrieve
digital information. Consumers often store confidential
information, files, or digital media purchases in the device.
was not secure against the forgery attack and the replay attack.
Furthermore, Lee et al. [9] argued that the protocol by Chen et
al. [8] was computationally inefficient. In order to solve the
These devices are low cost and easily portable so the security weaknesses, Lee et al. [9] proposed the three-factor
consumer often carries the device when travelling. As a result, authentication protocol based on elliptic curve cryptography.
The protocol from Lee et al. [9] required the user’s password,
Manuscript received January 12, 2017; accepted February 28, 2017. Date biometric and smartcard information as authentication tokens.
of publication April 12, 2017. (Corresponding author: Debasis Giri.) More recently, He et al. [10] demonstrated that the protocol
R. Amin is with the Department of Computer Science and Engineering,
Thapar University, Patiala, Punjab, India (e-mail: [email protected]). proposed by Lee et al. [9] was not secure against the password
R. S. Sherratt is with the Department of Biomedical Engineering, the guessing attack, Denial-of-Service (DoS) attack and the replay
University of Reading, RG6 6AY, UK (e-mail: [email protected]). attack, so proposed an improved three-factor authentication
D. Giri is with the Department of Computer Science and Engineering,
Haldia Institute of Technology, Haldia-721657, India (e-mail:
scheme. In order to resist the DoS attack, He et al. [10]
[email protected]). employed the concept of the fuzzy extractor [13], [14]. In
S. H. Islam is with the Department of Computer Science and Engineering, 2015, Amin and Biswas [15] proposed a three-factor
Indian Institute of Information Technology, Kalyani, West Bengal 741235, authentication protocol for the same environment using a hash
India (e-mail: [email protected]).
M. K. Khan is with the Center of Excellence in Information Assurance function to achieve a lower computation cost than existing
(CoEIA), King Saud University, Riyadh 11451, Saudi Arabia (e-Mail: protocols [9], [10].
[email protected]). This paper proposes a mutual authentication and key
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. agreement protocol to provide only authorized access to
Digital Object Identifier 10.1109/TCE.2017.014735 confidential information stored on the device with the aid of a
0098 3063/17/$20.00 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
54 IEEE Transactions on Consumer Electronics, Vol. 63, No. 1, February 2017
Registration Server (RS). A new user completes a registration device to defend unauthorized access. Firstly we have used the
procedure with RS allowing RS to deliver a link via e-mail concept of biometric data along with a password in our
from which the user can download and install registration protocol, hence it is difficult to guess the password along with
software in their device which also incorporates the required biometric information. Secondly, an attacker cannot utilize a
secure access information relevant for only each user. In order resetting technique, as we have mentioned in our protocol that
to provide secure access to files, the user provides the if the attacker desires to use resetting technique, he/she first
necessary identity, password and biometric information. The has to login into the system. As the attacker cannot login into
device checks the legitimacy of the user and then negotiates a the system without biometric data, the resetting technique is
session key with RS. It is to be noted that this session key is not usable.
used to encrypt the files in the storage device. This paper achieves the following contributions:
The rest of the paper is organized as follows: Section II A mutual authentication and key negotiation protocol to
presents an overview of the contribution and the novelty provide security protection of the stored information on the
claims. Section III presents the hash function, fuzzy extractor storage device,
and elliptic curve cryptography. The proposed protocol is Security analysis to show that the proposed protocol is
provided in Section IV. The security analysis using BAN logic robust against known security attacks. Furthermore, in the
is discussed in Section V. Section VI provides the proposed scheme, the mutual authentication and session key
performance evaluation and comparison of the proposed agreement have been verified using BAN logic.
protocol with related protocols. Section VII concludes the Significantly less communication overhead and
paper. TABLE I shows the nomenclature that is used computation costs than other related systems.
throughout the paper.
III. PRELIMINARIES
TABLE I This section defines the fuzzy extractor [10]-[14] and the
NOMENCLATURE
hash function [15] to analyze the security of the proposed
Term Usage protocol. Furthermore, the hardness assumption on the elliptic
curve group is discussed.
Ui i-th user
RS Remote server Definition 1: A cryptographic one-way hash function maps
PWi Password of user Ui a binary string of an arbitrary length to a binary string of fixed
BTi Biometric Template of user Ui length, called the hashed value. It can be symbolized as:
IDi Identity of user Ui
Ek[] Symmetric key encryption using key k h :{0,1}* {0,1}n , where n is a positive integer. The
Dk[] Symmetric key decryption using key k properties of the hash function have been presented [4], [5].
x Secret key of the remote server
(Px, Py) x and y coordinate of the elliptic curve point P
Definition 2: A fuzzy system based collision resistant
Ti Current timestamp of Ui’s storage device extractor can be modeled as a procedure which takes a binary
Tj Current timestamp of the Remote server
string, say b, of some metric space M 0,1 as an input for
n
ΔT Estimated time delay
UNSID Unique software identity some positive number n and outputs a random string, say
SL Software link
0,1 for some positive number l and an auxiliary string,
l
h(·) Cryptographic one-way hash function
REP() REP procedure in fuzzy extractor
GEN() GEN procedure in fuzzy extractor say 0,1r for some positive number r, where r can be l or
⊕ Bitwise XOR operator
|| Concatenation operator
n. This mapping procedure is denoted by GEN: M .
(a.b) Point multiplication operation of a and b Another procedure which takes two inputs: (i) a binary string
say, b' of the metric space M 0,1 , where b b ' , and (ii)
n
II. SYSTEM ENVIRONMENT an uniform distribution binary string say, 0,1r , and it
In this work, a Registration Server (RS) delivers a link to all
produces the random string 0,1 as output. This mapping
l
devised a standard security protocol which protects the storage ECC group is defined as: G p {( x, y ) : x, y F p and
R. Amin et al.: A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices 55
( x, y ) E p ( a , b )} {O} , where the point O is known as the UNSID i and SLi are the unique software identity and software
‘Point at Infinity’. The scalar point multiplication on the cyclic link respectively, and indicates empty attributes used to
group G p is defined as: [k].P = P + P +… + P), that means k store the encrypted key. Finally, RS delivers to Ui via e-mail a
times addition of P. link to user specific registration software (that includes SLi .)
Definition 3: Elliptic curve discrete logarithm problem: This registration software is provided by the registration
Given Q, R G p , computation of the integer k Z p * is server to all the consumers with the software content varying
with the user.
hard, where R k .Q . Step 4: After receiving the link for Ui to download the
Definition 4: Elliptic curve computational Diffie-Helman registration software, Ui installs it on their personal storage
problem: Given P, a .P, b.P , for some a, b Z p * , device. Ui then inputs bi into the registration software. Finally,
the registration software installed in Ui’s storage device
computation of a .b .P is hard. contains Di , IDi , Bi , bi , GEN (), REP (), h () .
Step 2: After receiving the registration message, RS i ' REP Bi ,i ' and Ai '' h PWBi ' || i ' . The registration
computes i , i GEN BTi , Ai h PWBi || i ,
Gi h IDi || x , Bi Gi PWBi , Ci i h IDi || PWBi software in Ui’s device checks conditions Ai '' ? Ai ' and
Bi ' ? Bi . If both the conditions are not correct, registration
and Di EGi Ai || Bi || Ci , where GEN() is the fuzzy
software of Ui aborts the connection; otherwise, accepts Ui.
extractor function.
Step 2: The registration software in Ui generates random
Step 3: RS then embeds Di , IDi , Bi , GEN (), REP (), h ()
number ri and sends IDi , M 5 , Ti to RS through an insecure
into the required registration software including all necessary
channel, where M 1 [ri ].P , M 2 [ i ].M 1 ,
parameters for the ECC cryptosystem. The registration
software is a simple software application that must be installed M 3 ( K x , K y ) [Gi ' ].Ppub ,
in the consumer device. RS needs to maintain a database for
M 4 h( IDi || M 1 || M 2 || Ti || K y ) and
storing all the registration information for all the consumers.
RS stores IDi , UNSIDi , SLi , into the database, where M 5 E K x ( M 1 || M 4 || PWB i || C i ) .
56 IEEE Transactions on Consumer Electronics, Vol. 63, No. 1, February 2017
legitimacy of Ui by computing Gi ' h IDi || x , retrieves SK i h IDi x from the local table in RS and
M 3 K x , K y Gi .Ppub ,
' ' ' '
then computes the old session key SK i . Finally, RS computes
M1 || M 4 || PWBi || Ci DK ' M 5 , i ' h IDi || PWBi Ci
x
M 8 EK ' SKi and sends
x
M7,M8 to Ui through an
, M 2' i ' .M1 and insecure channel. Then, the registration software in Ui
'
decrypts M 7 and M 8 using K y and K x ' respectively. In
M 3 ' h( IDi || M 1 || M 2 ' || Ti || K y ' ) . RS checks whether
order to verify the legitimacy of RS, the registration software
M 3 ' ? M 3 is true. If it is correct, then RS accepts Ui;
in Ui computes M 6' h IDi || PWBi || K x ' || rj ' || T j . If
otherwise, rejects Ui. M 6 M 6 , the registration software of Ui rejects the
'
Now, RS stores SKi h IDi x in the table against the Step 3: Finally, the registration software in Ui replaces Di
identity IDi. with new value Di * and keeps the remaining information
unchanged. Thus, Ui can change their old password without
E. File Accessing Phase requesting any assistance from RS.
In this phase, Ui makes a request to RS to access the
encrypted files stored in the consumer’s storage device. In G. Biometric Renewal Phase
order to do it, Ui executes Steps 1-3 of the mutual The execution of this phase is important whenever an
authentication and key negotiation phase to verify the existing user is willing to update their biometric information.
legitimacy of Ui and generate a new session key. After the The description of this phase is given as follows:
R. Amin et al.: A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices 57
Step 1: Ui runs the registration software installed the device R4: P X: P has jurisdiction over X. The principal P is
and then provides previous login information IDi, PWi and BTi an authority on X and should be trusted on this matter.
to the registration software. Then the registration software in R5: ♯(X): The message X is fresh.
Ui computes PWBi ' h PWi || bi , G i ' Bi PWB i ' , R6: (X, Y): The formulae X or Y is one part of the
formulae (X, Y).
Ai ' || Bi ' || Ci ' DG Di , i ' h IDi || PWBi ' Ci ' ,
i
'
R7: <X>Y: The formulae X combined with the formulae
i ' REP Bi ,i ' and Ai '' h PWBi ' || i ' . The registration Y.
R8: {X}K: The formulae X is encrypted under the
software in Ui checks that both conditions Ai '' ? Ai ' and formulae K.
Bi ' ? Bi . If false, the registration software in Ui aborts the R9: (X)K: The formulae X is hashed with the key K.
R10: P Q: Principal P and Q communicate via
K
session.
Step 2: Ui inputs new the biometric table BTi * . the shared key K.
R11: P Q: The formulae X is a secret known only to P
registration software of Ui computes i* ,i* GEN BTi* , and Q only and possible to principal trusted by them.
Ai* h PWBi || i* , Ci * i * h IDi || PWBi , and R12: SK: The session key used in the current session.
Di* EGi Ai* || Bi || Ci* . Relevant logical postulates of BAN logic for this work are:
Goal 3: RS | RS SK
U i According to ASM 1 , S9 and session key rule:
Goal 4: RS | U i | RS SK
U i S11: U i | U i SK
RS (Goal 1)
The proposed protocol is transformed to the idealized form According to ASM 1 , S11 and nonce verification rule:
as: S12: U i | RS | U i SK
RS (Goal 2)
MSG1 : U i RS : IDi , M 5 , Ti : M 1 G
i The above justification claims that the declared goals have
been successfully proven using BAN logic model. Therefore,
MSG2 : RS U i : M 7 : r j
Kx it can be claimed that the proposed protocol successfully
The following assumptions about the initial state of the provides mutual authentication property as well as session key
protocol are given: negotiation between the user and RS.
ASM 1 : U i | ( ri , r j ) B. Further Security Analysis
ASM 2 : RS | ( r j , ri ) It has been observed that numerous authentication protocols
Gi [1], [2], [13], [14], [17], [20] analyze the resilience against
ASM 3 : U i | U i RS
known attacks through informal security analysis [21], [22].
Kx
ASM 4 : RS | RS Ui Therefore, this section provides the description of the
ASM 5 : U i | RS r j resilience against the known security attacks, such as off-line
password guessing attack, privileged insider attack, user
ASM 6 : RS | U i ri impersonation attack, server impersonation attack, known key
Applying BAN logic rules and assumptions: security attack, stolen-verifier attack, DoS attack and mutual
MSG1 : U i RS : IDi , M 5 , Ti : M 1 G authentication.
i
1) Off-line password guessing attack
Thus During the registration phase, Ui’s password PWi was never
S1: RS IDi , M 5 , Ti : M 1 Gi
transmitted to RS in plaintext form and the computation of
PWBi depends on PWi and random number bi. Therefore, if
Applying assumption ASM 4 , S1 and message meaning rule
the adversary wants to guess PWi , they have to first know
gives:
S2: RS | U i ~ M 1 PWBi , which is used to compute M 5 in Step 2 of mutual
authentication and session key negotiation phase, where
According to ASM 2 , S2, freshness-conjuncatenation and
M 5 EK x M 1 || M 4 || PWBi || Ci and PWBi is encrypted
nonce verification rule:
S3: RS | U i | M 1 , where information of the parameter M 1 with key K x . Thus, the adversary cannot retrieve PWBi
is used to computed the session key in our protocol. without K x . Accordingly, the adversary cannot compute
According to ASM 6 , S3 and jurisdiction rule: PWBi using M6 without Ky , where
S4: RS | M 1 M 6 h IDi || PWBi || K x ' || rj ' || Tj . Hence, this proposed
According to ASM 2 , S3 and session key rule: protocol claims that it is immune to the password guessing
S5: RS | RS SK
U i (Goal 3) attack.
2) Privileged insider attack
According to ASM 2 , S5 and nonce verification rule:
During the registration, as mentioned in the literature [5],
S6: RS | U i | RS SK
U i (Goal 4) [6], a user’s password should not be sent to RS in plaintext
form during the registration phase in order to resist the insider
MSG2 : RS U i : M 7 : r j attack. In the registration phase of this work, Ui sends a
Kx
According to seeing rule: masked password PWBi to RS instead of PWi, where
PWBi h PWi || bi . Therefore, the insider attach of RS
S7: U i : M 7 : r j
Kx
cannot extract PWi from PWBi due to the strong collision
Applying the assumption ASM 3 , S7 and message meaning resistance property of the hash function h().
rule: 3) User impersonation attack
S8: U i | RS ~ r j Suppose that an adversary endeavors to impersonate Ui. In
order to do it, the adversary first captures Ui’s message from
According to ASM 1 , S8, freshness-conjuncatenation and
the public channel and then makes an effort to generate
nonce verification rule: another valid message, which should be authenticated by RS.
S9: U i RS | r j , where information of the parameter r j is
The adversary traps IDi , M 5 , Ti from the public channel and
used to computed session key in our protocol.
According to ASM 5 , S9 and jurisdiction rule: tries to compute M 2 , K y , Ci using the known information.
S10: U i | r j However, the adversary cannot compute M 2 and K y without
R. Amin et al.: A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices 59
REFERENCES
Ruhul Amin received his B.Tech and
[1] L. Lamport, “Password authentication with insecure communication,” M.Tech from West Bengal University of
Communications of the ACM, vol. 24, no. 11, pp. 770–772, Nov. 1981.
[2] M.-S. Hwang, and L.-H. Li, “A new remote user authentication scheme Computer Science and Engineering,
using smart cards,” IEEE Trans. Consumer Electron., vol. CE-46, no. 1, Indian Engineering in 2009 and 2013,
pp. 28–30, Feb. 2000. respectively. He was a Ph.D. research
[3] H.-M. Sun, “An efficient remote use authentication scheme using smart scholar in Computer Science and
cards,” IEEE Trans. Consumer Electron., vol. CE-46, no. 4, pp. 958–
961, Nov. 2000. Engineering, Indian School of Mines
[4] C.-K. Chan, and L.M. Cheng, “Cryptanalysis of a remote user (ISM), Dhanbad, India. He is currently a
authentication scheme using smart cards,” IEEE Trans. Consumer Lecturer in the Department of Computer
Electron., vol. CE-46, no. 4, pp. 992–993, Nov. 2000. Science and Engineering, Thapar University, Patiala, Punjab,
[5] R. Amin, and G. P. Biswas, “A secure light weight scheme for user
authentication and key agreement in multi-gateway based wireless India. He has published many research papers in Journals and
sensor networks,” Ad Hoc Networks, vol. 36, no. 1, pp. 58–80, Jan. Conference proceedings of International reputes. His current
2016. research interests include cryptographic authentication
[6] R. Amin, and G. P. Biswas, “A novel user authentication and key protocols and security in wireless sensor networks.
agreement protocol for accessing multi-medical server usable in TMIS,”
Journal of Medical Systems, vol. 39, no. 3, pp. 1–17, Mar. 2015.
[7] F.-Y. Yang, T.-D. Wu, and S.-H. Chiu, “A secure control protocol for
USB mass storage devices,” IEEE Trans. Consumer Electron., vol. CE- R. Simon Sherratt (M’97-SM’02-F’12)
56, no. 4, pp. 2339–2343, Nov. 2010. received the B.Eng. degree in Electronic
[8] B. Chen, C. Qin, and L. Yu, “A Secure Access Authentication Scheme Systems and Control Engineering from
for Removable Storage Media,” Journal of Information &
Computational Science, vol. 9, no. 15, pp. 4353–4363, Nov. 2012. Sheffield City Polytechnic, UK in 1992,
[9] C. Lee, C. Chen, and P. Wu, “Three-factor control protocol based on M.Sc. in Data Telecommunications in
elliptic curve cryptosystem for universal serial bus mass storage 1994 and Ph.D. in video signal processing
devices,” IET Computers & Digital Techniques, vol. 7, no. 1, pp. 48–55, in 1996 from the University of Salford,
Jan. 2013.
[10] D. He, N. Kumar, J.-H. Lee, and R. S. Sherratt, “Enhanced three-factor UK.
security protocol for consumer USB mass storage devices,” IEEE Trans. In 1996, he has appointed as a Lecturer
Consumer Electron., vol. CE-60, no. 1, pp. 30–37, Feb. 2014. in Electronic Engineering at the University of Reading where
[11] D. Giri, R. S. Sherratt, T. Maitra, and R. Amin, “Efficient Biometric and he is now Professor of Biosensors. His research topic is signal
Password Based Mutual Authentication for Consumer USB Mass
Storage Devices,” IEEE Trans. Consumer Electron., vol. CE-61, no. 4, processing and personal communications in consumer devices
pp. 491–499, Nov. 2015. focusing on wearable devices and healthcare.
R. Amin et al.: A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices 61
st
He received the 1 place IEEE Chester Sall Memorial SK Hafizul Islam received the M.Tech
Award in 2006, the 2nd place in 2016 and the 3rd place in 2017. from ISM Dhanbad in 2009 and the Ph.D
He is a reviewer for the IEEE SENSORS JOURNAL and is in Computer Science and Engineering
currently a Senior Editor and Emeritus Editor-in-Chief of the from Indian School of Mines, Dhanbad
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS. (SM Dhanbad), India. He was an Assistant
Professor in the Department of CSIS,
BITS Pilani, Pilani Campus, Rajasthan,
Debasis Giri received the Ph.D degree India and is currently an Assistant
from the Indian Institute of Technology, Professor in the Department of CSE, Indian Institute of
Kharagpur, India in 2009. He did his Information Technology, Kalyani (IIIT Kalyani), West
masters (M.Tech and M.Sc) both from Bengal, India. He has published 50 research papers in reputed
Indian Institute of Technology, Kharagpur, international Journals and Conference proceedings. He is an
India in 2001 and 1998 respectively. Associate Editor of the International Journal of
Presently he is a Dean under the school of Communication Systems, Wiley. His research interest
Electronic, Computer Science and includes Cryptography and Information Security.
Informatics of Haldia Institute of Technology, India, and
Professor in the Department of Computer Science and
Engineering, Haldia Institute of Technology, India. He has Muhammad Khurram Khan (M’07,
tenth All India Rank with percentile score 98.42 in the SM’12) is currently working as a Full
Graduate Aptitude Test in Engineering (GATE) Examination Professor at the Center of Excellence in
in 1999. His current research interests include Cryptography, Information Assurance (CoEIA), King
Network security, Data Hiding, Security in Wireless Sensor Saud University, Kingdom of Saudi
Networks and Security in VANETs. Arabia. He has published over 250
Dr. Giri is an Editorial Board Member and a Reviewer of research papers in the journals and
many reputed International Journals. Presently he is an conferences of international repute. In
Associate Editor of the Journal of Security and addition, he is an inventor of 10 US/PCT patents.
Communication Networks (Wiley), the Journal of Prof. Khan is the Editor-in-Chief of Telecommunication
Communication Systems (Wiley) and the Journal of Electrical Systems Journal, Springer. He is a Fellow of the IET, Fellow
and Computer Engineering Innovations. He is also a Program of the BCS, Fellow of the FTRA, a member of the IEEE
Committee member for many International Conferences. Technical Committee on Security & Privacy, a member of the
IEEE Cybersecurity community, and a member of IEEE
Consumer Electronics society.