Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

06.10.2016

An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices

verfasst von: Libing Wu, Yubo Zhang, Yong Xie, Abdulhameed Alelaiw, Jian Shen

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to its convenience and simplicity, the mobile application in the mobile devices has been widely used as necessary. As an essential way to provide secured communication between mobile users and servers, the authentication protocol for user devices has stirred active study. However, because mobile devices are limited on computing capability and energy, it still remains a difficult problem for designing a secure and efficient authentication and key agreement protocol for mobile devices. In this paper, we propose a new efficient and secure Identity-based authentication and key agreement protocol using elliptic curve cryptosystem for mobile devices. Security analysis and complexity comparisons show our proposed protocol can fulfill all of security requirements while has lower computation and communication costs than similar protocols for mobile devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Abi-Char, P.E., Mhamed, A., & Bachar, E.H. (2007). A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), pp. 235–240. IEEE. Abi-Char, P.E., Mhamed, A., & Bachar, E.H. (2007). A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), pp. 235–240. IEEE.
3.
Zurück zum Zitat Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.CrossRef Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.CrossRef
4.
Zurück zum Zitat Boneh, D., & Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM journal on computing, 32(3), 586–615.MathSciNetCrossRefMATH Boneh, D., & Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM journal on computing, 32(3), 586–615.MathSciNetCrossRefMATH
5.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R.M. (1989). A logic of authentication. In Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 426 (pp. 233–271). The Royal Society. Burrows, M., Abadi, M., & Needham, R.M. (1989). A logic of authentication. In Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 426 (pp. 233–271). The Royal Society.
6.
Zurück zum Zitat Cao, X., Kou, W., Dang, L., & Zhao, B. (2008). Imbas: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer communications, 31(4), 659–667.CrossRef Cao, X., Kou, W., Dang, L., & Zhao, B. (2008). Imbas: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer communications, 31(4), 659–667.CrossRef
7.
Zurück zum Zitat Chen, Z.G., & Song, X.X. (2007). A distributed electronic authentication scheme based on elliptic curve. In 2007 International Conference on Machine Learning and Cybernetics, 4 (pp. 2179–2182). IEEE. Chen, Z.G., & Song, X.X. (2007). A distributed electronic authentication scheme based on elliptic curve. In 2007 International Conference on Machine Learning and Cybernetics, 4 (pp. 2179–2182). IEEE.
8.
Zurück zum Zitat Das, M. L., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers & Security, 25(3), 184–189.CrossRef Das, M. L., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers & Security, 25(3), 184–189.CrossRef
9.
Zurück zum Zitat Debiao, H., Jianhua, C., & Jin, H. (2012). An id-based client authentication with key agreement protocol for mobile client-server environment on ecc with provable security. Information Fusion, 13(3), 223–230.CrossRef Debiao, H., Jianhua, C., & Jin, H. (2012). An id-based client authentication with key agreement protocol for mobile client-server environment on ecc with provable security. Information Fusion, 13(3), 223–230.CrossRef
13.
Zurück zum Zitat Goriparthi, T., Das, M. L., & Saxena, A. (2009). An improved bilinear pairing based remote user authentication scheme. Computer Standards & Interfaces, 31(1), 181–185.CrossRef Goriparthi, T., Das, M. L., & Saxena, A. (2009). An improved bilinear pairing based remote user authentication scheme. Computer Standards & Interfaces, 31(1), 181–185.CrossRef
14.
Zurück zum Zitat He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.CrossRef He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.CrossRef
15.
Zurück zum Zitat He, D., Chen, C., Bu, J., Chan, S., & Zhang, Y. (2013). Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. IEEE Communications Magazine, 51(2), 142–150.CrossRef He, D., Chen, C., Bu, J., Chan, S., & Zhang, Y. (2013). Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. IEEE Communications Magazine, 51(2), 142–150.CrossRef
16.
Zurück zum Zitat Hughes, D., & Shmatikov, V. (2004). Information hiding, anonymity and privacy: a modular approach. Journal of Computer security, 12(1), 3–36.CrossRef Hughes, D., & Shmatikov, V. (2004). Information hiding, anonymity and privacy: a modular approach. Journal of Computer security, 12(1), 3–36.CrossRef
17.
Zurück zum Zitat Jiang, C., Li, B., & Xu, H. (2007). An efficient scheme for user authentication in wireless sensor networks. In Advanced Information Networking and Applications Workshops, 2007, AINAW’07. 21st International Conference on, 1 (pp. 438–442). IEEE. Jiang, C., Li, B., & Xu, H. (2007). An efficient scheme for user authentication in wireless sensor networks. In Advanced Information Networking and Applications Workshops, 2007, AINAW’07. 21st International Conference on, 1 (pp. 438–442). IEEE.
18.
Zurück zum Zitat Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef
20.
Zurück zum Zitat Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography. In N. Koblitz (Ed.), Towards a quarter-century of public key cryptography (pp. 103–123). Berlin: Springer.CrossRef Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography. In N. Koblitz (Ed.), Towards a quarter-century of public key cryptography (pp. 103–123). Berlin: Springer.CrossRef
21.
Zurück zum Zitat Scott, M., Costigan, N., & Abdulwahab, W. (2006). Implementing cryptographic pairings on smartcards. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 134–147). Berlin: Springer. Scott, M., Costigan, N., & Abdulwahab, W. (2006). Implementing cryptographic pairings on smartcards. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 134–147). Berlin: Springer.
22.
Zurück zum Zitat Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 47–53). Berlin: Springer. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 47–53). Berlin: Springer.
23.
Zurück zum Zitat Tian, X., Wong, D. S., & Zhu, R. W. (2005). Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications letters, 9(11), 970–972.CrossRef Tian, X., Wong, D. S., & Zhu, R. W. (2005). Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications letters, 9(11), 970–972.CrossRef
24.
Zurück zum Zitat Tsai, J. L., & Lo, N. W. (2015). Provably secure and efficient anonymous id-based authentication protocol for mobile devices using bilinear pairings. Wireless Personal Communications, 83(2), 1273–1286.CrossRef Tsai, J. L., & Lo, N. W. (2015). Provably secure and efficient anonymous id-based authentication protocol for mobile devices using bilinear pairings. Wireless Personal Communications, 83(2), 1273–1286.CrossRef
25.
Zurück zum Zitat Wang, D., & Ma, C. G. (2013). Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ecc. Information Fusion, 14(4), 498–503.CrossRef Wang, D., & Ma, C. G. (2013). Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ecc. Information Fusion, 14(4), 498–503.CrossRef
26.
Zurück zum Zitat Wang, Y. (2013). Effcient identity-based and authenticated key agreement protocol. Trans-actions on Computational Science Xvii (pp. 172–197). Berlin: Springer.CrossRef Wang, Y. (2013). Effcient identity-based and authenticated key agreement protocol. Trans-actions on Computational Science Xvii (pp. 172–197). Berlin: Springer.CrossRef
27.
Zurück zum Zitat Wu, T. Y., & Tseng, Y. M. (2010). An efficient user authentication and key exchange protocol for mobile client-server environment. Computer Networks, 54(9), 1520–1530.CrossRefMATH Wu, T. Y., & Tseng, Y. M. (2010). An efficient user authentication and key exchange protocol for mobile client-server environment. Computer Networks, 54(9), 1520–1530.CrossRefMATH
28.
Zurück zum Zitat Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security, 9(12), 2327–2339.CrossRef Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security, 9(12), 2327–2339.CrossRef
29.
Zurück zum Zitat Xuefei, C., Weidong, K., Yong, Y., & Rong, S. (2008). Identity-based authenticated key agreement protocols without bilinear pairings. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 91(12), 3833–3836. Xuefei, C., Weidong, K., Yong, Y., & Rong, S. (2008). Identity-based authenticated key agreement protocols without bilinear pairings. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 91(12), 3833–3836.
30.
Zurück zum Zitat Yang, J. H., & Chang, C. C. (2009). An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & security, 28(3), 138–143.CrossRef Yang, J. H., & Chang, C. C. (2009). An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & security, 28(3), 138–143.CrossRef
31.
Zurück zum Zitat Yoon, E.J., & Yoo, K.Y. (2009). Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. In Computational Science and Engineering, 2009. CSE’09. International Conference on, 2 (pp. 633–640). IEEE. Yoon, E.J., & Yoo, K.Y. (2009). Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. In Computational Science and Engineering, 2009. CSE’09. International Conference on, 2 (pp. 633–640). IEEE.
32.
Zurück zum Zitat Yoon, E.J., & Yoo, K.Y. (2010). A new efficient id-based user authentication and key exchange protocol for mobile client-server environment. In 2010 IEEE International Conference on Wireless Information Technology and Systems. Yoon, E.J., & Yoo, K.Y. (2010). A new efficient id-based user authentication and key exchange protocol for mobile client-server environment. In 2010 IEEE International Conference on Wireless Information Technology and Systems.
33.
Zurück zum Zitat Zhang, Y., Chen, J., Huang, B., & Peng, C. (2014). An efficient password authentication scheme using smart card based on elliptic curve cryptography. Information Technology And Control, 43(4), 390–401.CrossRef Zhang, Y., Chen, J., Huang, B., & Peng, C. (2014). An efficient password authentication scheme using smart card based on elliptic curve cryptography. Information Technology And Control, 43(4), 390–401.CrossRef
Metadaten
Titel
An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
verfasst von
Libing Wu
Yubo Zhang
Yong Xie
Abdulhameed Alelaiw
Jian Shen
Publikationsdatum
06.10.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3781-z

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt