Skip to main content
Erschienen in: Wireless Personal Communications 1/2014

01.09.2014

A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks

verfasst von: Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang

Erschienen in: Wireless Personal Communications | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Mun et al. analyzed Wu et al.’s authentication scheme and proposed an enhanced anonymous authentication scheme for roaming service in global mobility networks. However, through careful analysis, we find that Mun et al.’s scheme is vulnerable to impersonation attacks and insider attacks, and cannot provide user friendliness, user’s anonymity, proper mutual authentication and local verification. To remedy these weaknesses, we propose a novel anonymous authentication scheme for roaming service in global mobility networks. Compared with previous related works, our scheme has many advantages. Firstly, the secure authenticity of the scheme is formally validated by an useful formal model called BAN logic. Secondly, the scheme enjoys many important security attributes including prevention of various attacks, user anonymity, no verification table, local password verification and so on. Thirdly, the scheme does not use timestamp, thus it avoids the clock synchronization problem. Further, the scheme contains the authentication and establishment of session key scheme when mobile user is located in his/her home network, therefore it is more practical and universal for global mobility networks. Finally, performance and cost analysis show our scheme is more suitable for low-power and resource limited mobile devices and thus availability for real implementation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Suzukiz, S., & Nakada, K. (1997). An authentication technique based on distributed security management for the global mobility network. IEEE Journal Selected Areas in Communications, 15(8), 1608–1617.CrossRef Suzukiz, S., & Nakada, K. (1997). An authentication technique based on distributed security management for the global mobility network. IEEE Journal Selected Areas in Communications, 15(8), 1608–1617.CrossRef
2.
Zurück zum Zitat He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef
3.
Zurück zum Zitat Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 51(1), 230–234.MathSciNet Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 51(1), 230–234.MathSciNet
4.
Zurück zum Zitat Lee, C., Hwang, M., & Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1686.CrossRef Lee, C., Hwang, M., & Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1686.CrossRef
5.
Zurück zum Zitat Chang, C., Lee, C., & Chiu, Y. (2009). Enhanced authentication scheme with anonymity for roaming service in global networks. Computer Communications, 32(4), 611–618.CrossRef Chang, C., Lee, C., & Chiu, Y. (2009). Enhanced authentication scheme with anonymity for roaming service in global networks. Computer Communications, 32(4), 611–618.CrossRef
6.
Zurück zum Zitat Wu, C., Lee, W., & Tsaur, W. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.CrossRef Wu, C., Lee, W., & Tsaur, W. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.CrossRef
7.
Zurück zum Zitat Li, C., & Lee, C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNet Li, C., & Lee, C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNet
8.
Zurück zum Zitat Mun, H., Han, K., Lee, Y., Yeun, C., & Choi, H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1–2), 214–222. Mun, H., Han, K., Lee, Y., Yeun, C., & Choi, H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1–2), 214–222.
9.
Zurück zum Zitat He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.CrossRef He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.CrossRef
10.
Zurück zum Zitat Das, A. (2013). A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Science, 2(1–2), 12–17.CrossRef Das, A. (2013). A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Science, 2(1–2), 12–17.CrossRef
11.
Zurück zum Zitat Yoon, E., Yoo, K., & Ha, K. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering, 37(3), 356–364.CrossRef Yoon, E., Yoo, K., & Ha, K. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering, 37(3), 356–364.CrossRef
12.
Zurück zum Zitat Ou, H., Hwang, M., & Jan, J. (2010). A cocktail protocol with the authentication and key agreement on the UMTS. Journal of Systems and Software, 83(2), 316–325.CrossRef Ou, H., Hwang, M., & Jan, J. (2010). A cocktail protocol with the authentication and key agreement on the UMTS. Journal of Systems and Software, 83(2), 316–325.CrossRef
13.
Zurück zum Zitat Yang, G., Huang, Q., Wong, D., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communication, 9(1), 168–174.CrossRef Yang, G., Huang, Q., Wong, D., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communication, 9(1), 168–174.CrossRef
14.
Zurück zum Zitat Lee, C., Chen, C., Ou, H., & Chen, L. (2013). Extension of an efficient 3GPP authentication and key agreement protocol. Wireless Personal Communications, 68(3), 861–872.CrossRef Lee, C., Chen, C., Ou, H., & Chen, L. (2013). Extension of an efficient 3GPP authentication and key agreement protocol. Wireless Personal Communications, 68(3), 861–872.CrossRef
15.
Zurück zum Zitat Juang, W., Chen, S., & Liaw, H. (2008). Robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 55(6), 2551–2556.CrossRef Juang, W., Chen, S., & Liaw, H. (2008). Robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 55(6), 2551–2556.CrossRef
16.
Zurück zum Zitat Yang, G., Wong, D., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 1035–1042. Yang, G., Wong, D., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 1035–1042.
17.
Zurück zum Zitat Wen, F., Susilo, W., & Yang, G. (2013). Asecure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 73(3), 993–1004.CrossRef Wen, F., Susilo, W., & Yang, G. (2013). Asecure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 73(3), 993–1004.CrossRef
18.
Zurück zum Zitat He, D., Zhang, Y., & Chen, J. (2014). Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications, 74(2), 229–243.CrossRef He, D., Zhang, Y., & Chen, J. (2014). Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications, 74(2), 229–243.CrossRef
19.
Zurück zum Zitat Kim, J., & Kwak, J. (2012). Improved secure anonymous authentication scheme for roaming service in global mobility networks. International Journal of Security and Its Applications, 6(3), 45–54. Kim, J., & Kwak, J. (2012). Improved secure anonymous authentication scheme for roaming service in global mobility networks. International Journal of Security and Its Applications, 6(3), 45–54.
20.
Zurück zum Zitat Chang, C., Le, H., & Chang, C. (2013). Novel untraceable authenticated key agreement protocol suitable for mobile communication. Wireless Personal Communications, 71(1), 425–437.CrossRef Chang, C., Le, H., & Chang, C. (2013). Novel untraceable authenticated key agreement protocol suitable for mobile communication. Wireless Personal Communications, 71(1), 425–437.CrossRef
21.
Zurück zum Zitat Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef
22.
Zurück zum Zitat Xie, Q., Hu, B., Tan, X., Bao, M., & Yu, X. (2014). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74(2), 601–614.CrossRef Xie, Q., Hu, B., Tan, X., Bao, M., & Yu, X. (2014). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74(2), 601–614.CrossRef
23.
Zurück zum Zitat Xu, J., & Zhu, W. T. (2013). A generic framework for anonymous authentication in mobile networks. Journal of Computer Science and Technology, 28(4), 732–742.CrossRef Xu, J., & Zhu, W. T. (2013). A generic framework for anonymous authentication in mobile networks. Journal of Computer Science and Technology, 28(4), 732–742.CrossRef
24.
Zurück zum Zitat Kim, J. S., & Kwak, J. (2013). Secure and efficient anonymous authentication scheme in global mobility networks. Journal of Applied Mathematics, Volume 2013, Article ID 302582. Kim, J. S., & Kwak, J. (2013). Secure and efficient anonymous authentication scheme in global mobility networks. Journal of Applied Mathematics, Volume 2013, Article ID 302582.
25.
Zurück zum Zitat Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH
27.
Zurück zum Zitat Miller, V. S. (1985). Use of elliptic curves in cryptography. Proceeding on Advances in Cryptology-CRYPTO’ 85 (pp. 417–426). New York: Springer. Miller, V. S. (1985). Use of elliptic curves in cryptography. Proceeding on Advances in Cryptology-CRYPTO’ 85 (pp. 417–426). New York: Springer.
28.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. (1990). Alogic of authentication. ACM Transaction on Computer System, 8(1), 18–36.CrossRef Burrows, M., Abadi, M., & Needham, R. (1990). Alogic of authentication. ACM Transaction on Computer System, 8(1), 18–36.CrossRef
29.
Zurück zum Zitat Zhao, D., Peng, H., Wang, C., & Yang, Y. (2012). A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Computers & Mathematics with Applications, 64(4), 611–615.CrossRefMATHMathSciNet Zhao, D., Peng, H., Wang, C., & Yang, Y. (2012). A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Computers & Mathematics with Applications, 64(4), 611–615.CrossRefMATHMathSciNet
30.
Zurück zum Zitat Yoo, S., Lee, H., & Kim, J. (2013). A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks Volume 2013, Article ID 543950. Yoo, S., Lee, H., & Kim, J. (2013). A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks Volume 2013, Article ID 543950.
Metadaten
Titel
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
verfasst von
Dawei Zhao
Haipeng Peng
Lixiang Li
Yixian Yang
Publikationsdatum
01.09.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1750-y

Weitere Artikel der Ausgabe 1/2014

Wireless Personal Communications 1/2014 Zur Ausgabe

Neuer Inhalt