Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2020

28.06.2020

A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments

verfasst von: R. Shashidhara, Sriramulu Bojjagani, Anup Kumar Maurya, Saru Kumari, Hu Xiong

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The authentication system plays a crucial role in the context of GLObal MObility NETwork (GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service over multiple Foreign Agents (FA). However, designing a robust and anonymous authentication protocol along with a user privacy is essential and challenging task. Due to the resource constrained property of mobile terminals, the broadcast nature of a wireless channel, mobility environments are frequently exposed to several attacks. Many researchers focus their interests on designing an efficient and secure mobile user authentication protocol for mobility networks. Very recently (in 2018), Xu et al presented the novel anonymous authentication system for roaming in GLOMONET, and insisted that their protocol is more secure than existing authentication protocols. The security strength of Xu et al.’s authentication protocol is analysed and identified that the protocol is vulnerable to stolen verifier attack, privileged insider attack, impersonation attack and denial of service attack. In-fact, the protocol suffers from clock synchronization problem and cannot afford local password-verification to detect wrong passwords quickly. As a remedy, we proposed an efficient and robust anonymous authentication protocol for mobility networks. The proposed mobile user authentication protocol achieves the provable security and has the ability to resist against numerous network attacks. Besides, the correctness of the novel authentication protocol is validated using formal security tool called AVISPA (Automated Validation of Internet Security Protocols & Applications). Finally, the performance analysis and simulation results reveals that the proposed authentication protocol is computationally efficient and practically implementable in resource limited mobility environments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pres Commun 84(3):2055–2078CrossRef Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pres Commun 84(3):2055–2078CrossRef
2.
Zurück zum Zitat Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379CrossRef Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379CrossRef
3.
Zurück zum Zitat Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83–92CrossRef Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83–92CrossRef
4.
Zurück zum Zitat Madhusudhan R, Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in glomonet. Peer Peer Netw Appl 1–22 Madhusudhan R, Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in glomonet. Peer Peer Netw Appl 1–22
5.
Zurück zum Zitat Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235CrossRef Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235CrossRef
6.
Zurück zum Zitat Lee C, Hwang M, Liao E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687CrossRef Lee C, Hwang M, Liao E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687CrossRef
7.
Zurück zum Zitat Wu C, Lee W, Tsaur W, et al. (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRef Wu C, Lee W, Tsaur W, et al. (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRef
8.
Zurück zum Zitat Yoon E, Yoo K (2011) Young, Ha, K.: A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364CrossRef Yoon E, Yoo K (2011) Young, Ha, K.: A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364CrossRef
9.
Zurück zum Zitat Li C, Lee C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44MathSciNetCrossRef Li C, Lee C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44MathSciNetCrossRef
10.
Zurück zum Zitat He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374CrossRef He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374CrossRef
11.
Zurück zum Zitat Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371CrossRef Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371CrossRef
12.
Zurück zum Zitat Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pres Commun 68(4):1477–1491CrossRef Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pres Commun 68(4):1477–1491CrossRef
13.
Zurück zum Zitat Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004CrossRef Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004CrossRef
14.
Zurück zum Zitat Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pres Commun 78(1):247–269CrossRef Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pres Commun 78(1):247–269CrossRef
15.
Zurück zum Zitat Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222MathSciNetCrossRef Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222MathSciNetCrossRef
16.
Zurück zum Zitat Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542CrossRef Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542CrossRef
17.
Zurück zum Zitat Al Amiri W, Baza M, Mahmoud M, Alasmary W, Akkaya K Towards secure smart parking system using blockchain technology Al Amiri W, Baza M, Mahmoud M, Alasmary W, Akkaya K Towards secure smart parking system using blockchain technology
18.
Zurück zum Zitat Amiri WA, Baza M, Banawan K, Mahmoud M, Alasmary W, Akkaya K (2019). Privacy-preserving smart parking system using blockchain and private information retrieval. arXiv:1904.09703 Amiri WA, Baza M, Banawan K, Mahmoud M, Alasmary W, Akkaya K (2019). Privacy-preserving smart parking system using blockchain and private information retrieval. arXiv:1904.​09703
19.
Zurück zum Zitat Baza M, Nabil M, Ismail M, Mahmoud M, Serpedin E, Rahman M (2018). Blockchain-based charging coordination mechanism for smart grid energy storage units. arXiv:1811.02001 Baza M, Nabil M, Ismail M, Mahmoud M, Serpedin E, Rahman M (2018). Blockchain-based charging coordination mechanism for smart grid energy storage units. arXiv:1811.​02001
20.
Zurück zum Zitat Baza M, Nabil M, Lasla N, Fidan K, Mahmoud M, Abdallah M (2019) Blockchain-based firmware update scheme tailored for autonomous vehicles. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–7 Baza M, Nabil M, Lasla N, Fidan K, Mahmoud M, Abdallah M (2019) Blockchain-based firmware update scheme tailored for autonomous vehicles. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–7
21.
22.
Zurück zum Zitat Baza M, Nabil M, Bewermeier N, Fidan K, Mahmoud M, Abdallah M (2019). Detecting sybil attacks using proofs of work and location in vanets. arXiv:1904.05845 Baza M, Nabil M, Bewermeier N, Fidan K, Mahmoud M, Abdallah M (2019). Detecting sybil attacks using proofs of work and location in vanets. arXiv:1904.​05845
23.
Zurück zum Zitat Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8CrossRef Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8CrossRef
24.
Zurück zum Zitat Guo D, Wen F (2016) A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw Secur 18(2):217–223 Guo D, Wen F (2016) A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw Secur 18(2):217–223
25.
Zurück zum Zitat Madhusudhan R, et al. (2016) An effcient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security. ACM, pp 119–126 Madhusudhan R, et al. (2016) An effcient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security. ACM, pp 119–126
26.
Zurück zum Zitat Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann Telecommun 72(3–4):131–144CrossRef Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann Telecommun 72(3–4):131–144CrossRef
27.
Zurück zum Zitat Bojjagani S, Sastry V (2017) A secure end-to-end sms-based mobile banking protocol. Int J Commun Syst 30(15):3302CrossRef Bojjagani S, Sastry V (2017) A secure end-to-end sms-based mobile banking protocol. Int J Commun Syst 30(15):3302CrossRef
28.
Zurück zum Zitat Bojjagani S, Sastry V A secure end-to-end proximity nfc-based mobile payment protocol. Comput Stand Inter 66 Bojjagani S, Sastry V A secure end-to-end proximity nfc-based mobile payment protocol. Comput Stand Inter 66
29.
Zurück zum Zitat Karuppiah M, Kumari S, Li X, Wu F, Das AK, Khan MK, Saravanan R, Basu S (2017) A dynamic idbased generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel Pres Commun 93(2):383–407CrossRef Karuppiah M, Kumari S, Li X, Wu F, Das AK, Khan MK, Saravanan R, Basu S (2017) A dynamic idbased generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel Pres Commun 93(2):383–407CrossRef
30.
Zurück zum Zitat Arshad H, Rasoolzadegan A (2017) A secure authentication and key agreement scheme for roaming service with user anonymity. Int J Commun Syst Arshad H, Rasoolzadegan A (2017) A secure authentication and key agreement scheme for roaming service with user anonymity. Int J Commun Syst
31.
Zurück zum Zitat Madhusudhan R, Shashidhara R (2019) A novel dna based password authentication system for global roaming in resource-limited mobile environments. Multimed Tool Appl 1–28 Madhusudhan R, Shashidhara R (2019) A novel dna based password authentication system for global roaming in resource-limited mobile environments. Multimed Tool Appl 1–28
32.
Zurück zum Zitat Madhusudhan R, Shashidhara R (2019) A secure anonymous authentication protocol for roaming service in resource-constrained mobility environments. Arab J Sci Eng 1–22 Madhusudhan R, Shashidhara R (2019) A secure anonymous authentication protocol for roaming service in resource-constrained mobility environments. Arab J Sci Eng 1–22
33.
Zurück zum Zitat Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. Int J Secur Appl 9(10):297–312 Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. Int J Secur Appl 9(10):297–312
34.
Zurück zum Zitat Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology—CRYPTO’99. Springer, pp 388–397 Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology—CRYPTO’99. Springer, pp 388–397
35.
Zurück zum Zitat Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secur Comput 12(4):428–442CrossRef Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secur Comput 12(4):428–442CrossRef
36.
Zurück zum Zitat Madhusudhan R, et al. (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inform Secur Appl 38:96–110 Madhusudhan R, et al. (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inform Secur Appl 38:96–110
37.
Zurück zum Zitat Armando A, Basin D, Cuellar J, Rusinowitch M, Viganó L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64 Armando A, Basin D, Cuellar J, Rusinowitch M, Viganó L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64
38.
Zurück zum Zitat Reddy AG, Das AK, Yoon E-J, Yoo K-Y (2016) A secure anonymous authentication protocol for mobile ser vices on elliptic curve cryptography. IEEE Access 4:4394–4407CrossRef Reddy AG, Das AK, Yoon E-J, Yoo K-Y (2016) A secure anonymous authentication protocol for mobile ser vices on elliptic curve cryptography. IEEE Access 4:4394–4407CrossRef
39.
Zurück zum Zitat Odelu V, Das AK, Kumari S, Huang X, Wazid M (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener Comput Syst 68:74–88CrossRef Odelu V, Das AK, Kumari S, Huang X, Wazid M (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener Comput Syst 68:74–88CrossRef
Metadaten
Titel
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
verfasst von
R. Shashidhara
Sriramulu Bojjagani
Anup Kumar Maurya
Saru Kumari
Hu Xiong
Publikationsdatum
28.06.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00929-y

Weitere Artikel der Ausgabe 6/2020

Peer-to-Peer Networking and Applications 6/2020 Zur Ausgabe