Skip to main content
Erschienen in: Annals of Telecommunications 3-4/2017

19.11.2016

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks

verfasst von: Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Muhammad Khurram Khan, Ashok Kumar Das

Erschienen in: Annals of Telecommunications | Ausgabe 3-4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Roaming service is required in the ubiquitous access used in the global mobility networks (GLOMONETs) and the security is one of the most important issues. Many researchers focus their interests on authentication schemes for GLOMONETs. In 2015, Gope and Hwang, Zhang et al. and Farash et al. proposed their key agreement authentication schemes for GLOMONETs, respectively. However, we find weaknesses in them. Gope and Hwang’s scheme is under the off-line guessing attack and the de-synchronization attack. Moreover, it does not keep strong forward security and the session key is known by the home agent. Zhang et al.’s scheme has several weaknesses including vulnerability to the off-line guessing attack, destitution of password change phase, and the leakage of updated session key. Farash et al.’s scheme lacks user anonymity and strong forward secrecy and is vulnerable to the off-line password guessing attack. The session key is known to the home agent, too. Furthermore, neither Gope and Hwang’s scheme nor Farash et al.’s scheme has the session key update phase. To eliminate the problems, we present an improved authentication and key agreement scheme for GLOMONETs. According to the formal proof and the informal analysis, our scheme is well-performed and applicable.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, ACM, pp 241–250 Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, ACM, pp 241–250
2.
Zurück zum Zitat Chang CC, Lee CY, Chiu YC (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618CrossRef Chang CC, Lee CY, Chiu YC (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618CrossRef
3.
Zurück zum Zitat Chen Y, Xu W, Xiong H (2015) Strongly secure certificateless key-insulated signature secure in the standard model. Ann Telecommun 70(9-10):395–405CrossRef Chen Y, Xu W, Xiong H (2015) Strongly secure certificateless key-insulated signature secure in the standard model. Ann Telecommun 70(9-10):395–405CrossRef
4.
Zurück zum Zitat Farash MS, Chaudhry SA, Heydari M, Sadough S, Mohammad S, Kumari S, Khan MK (2015) A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems. doi:10.1002/dac.3019 Farash MS, Chaudhry SA, Heydari M, Sadough S, Mohammad S, Kumari S, Khan MK (2015) A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems. doi:10.​1002/​dac.​3019
5.
Zurück zum Zitat Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82(4):2231–2245CrossRef Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82(4):2231–2245CrossRef
6.
Zurück zum Zitat Guo P, Wang J, Geng XH, Kim CS, Kim JU (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935 Guo P, Wang J, Geng XH, Kim CS, Kim JU (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935
7.
Zurück zum Zitat He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823CrossRef He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823CrossRef
8.
Zurück zum Zitat He D, Zeadally S (2015) Authentication protocol for an ambient assisted living system. IEEE Commun Mag 53(1):71–77CrossRef He D, Zeadally S (2015) Authentication protocol for an ambient assisted living system. IEEE Commun Mag 53(1):71–77CrossRef
9.
Zurück zum Zitat He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243CrossRef He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243CrossRef
10.
Zurück zum Zitat He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321:263–277CrossRef He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321:263–277CrossRef
11.
Zurück zum Zitat Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477– 1491CrossRef Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477– 1491CrossRef
12.
Zurück zum Zitat Jiang Q, Ma J, Lu X, Tian Y (2015a) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw Appl 8:1070–1081. doi:10.1007/s12083-014-0285-z Jiang Q, Ma J, Lu X, Tian Y (2015a) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw Appl 8:1070–1081. doi:10.​1007/​s12083-014-0285-z
13.
Zurück zum Zitat Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A (2015b) Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn 83(4):2085–2101 Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A (2015b) Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn 83(4):2085–2101
14.
15.
Zurück zum Zitat Kim JS, Kwak J (2013) Secure and efficient anonymous authentication scheme in global mobility networks. J Appl Math 72(10):3826–3849 Kim JS, Kwak J (2013) Secure and efficient anonymous authentication scheme in global mobility networks. J Appl Math 72(10):3826–3849
16.
Zurück zum Zitat Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology-CRYPTO’99, Springer, pp 388–397 Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology-CRYPTO’99, Springer, pp 388–397
17.
Zurück zum Zitat Lee CC, Hwang MS, Liao IE (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687CrossRef Lee CC, Hwang MS, Liao IE (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687CrossRef
18.
Zurück zum Zitat Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95CrossRef Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95CrossRef
19.
Zurück zum Zitat Malina L, Hajny J, Zeman V (2015) Usability of pairing-based cryptography on smartphones. In: Telecommunications and Signal Processing (TSP), 2015 38th International Conference on, IEEE, pp 617–621 Malina L, Hajny J, Zeman V (2015) Usability of pairing-based cryptography on smartphones. In: Telecommunications and Signal Processing (TSP), 2015 38th International Conference on, IEEE, pp 617–621
20.
Zurück zum Zitat Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214– 222MathSciNetCrossRefMATH Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214– 222MathSciNetCrossRefMATH
21.
Zurück zum Zitat Ometov A, Masek P, Malina L, Florea R, Hosek J, Andreev S, Hajny J, Niutanen J, Koucheryavy Y (2016) Feasibility characterization of cryptographic primitives for constrained (wearable) iot devices. In: 2016 IEEE International conference on pervasive computing and communication workshops (PerCom Workshops), IEEE, pp 1–6 Ometov A, Masek P, Malina L, Florea R, Hosek J, Andreev S, Hajny J, Niutanen J, Koucheryavy Y (2016) Feasibility characterization of cryptographic primitives for constrained (wearable) iot devices. In: 2016 IEEE International conference on pervasive computing and communication workshops (PerCom Workshops), IEEE, pp 1–6
22.
Zurück zum Zitat Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323 Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323
24.
Zurück zum Zitat Shin S, Yeh H, Kim K (2015) An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw Appl 8:674–683CrossRef Shin S, Yeh H, Kim K (2015) An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw Appl 8:674–683CrossRef
25.
Zurück zum Zitat Wang D, Wang P, He D (2015) Anonymous two-factor authentication: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing 12. doi:10.1109/TDSC.2014.2355850 Wang D, Wang P, He D (2015) Anonymous two-factor authentication: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing 12. doi:10.​1109/​TDSC.​2014.​2355850
26.
Zurück zum Zitat Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993– 1004CrossRef Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993– 1004CrossRef
27.
Zurück zum Zitat Wu CC, Lee WB, Tsaur WJ (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRef Wu CC, Lee WB, Tsaur WJ (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRef
29.
Zurück zum Zitat Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542. doi:10.1002/sec.1558 CrossRef Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542. doi:10.​1002/​sec.​1558 CrossRef
30.
Zurück zum Zitat Xu L, Wu F (2015a) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2):1–9 Xu L, Wu F (2015a) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2):1–9
31.
Zurück zum Zitat Xu L, Wu F (2015b) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260. doi:10.1002/sec.977 Xu L, Wu F (2015b) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260. doi:10.​1002/​sec.​977
32.
Zurück zum Zitat Youn TY, Park YH, Lim J (2009) Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun Lett 13(7):471–473CrossRef Youn TY, Park YH, Lim J (2009) Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun Lett 13(7):471–473CrossRef
33.
Zurück zum Zitat Zhang G, Fan D, Zhang Y, Li X, Liu X (2015) A privacy preserving authentication scheme for roaming services in global mobility networks. Secur Commun Netw 8(16):2850–2859CrossRef Zhang G, Fan D, Zhang Y, Li X, Liu X (2015) A privacy preserving authentication scheme for roaming services in global mobility networks. Secur Commun Netw 8(16):2850–2859CrossRef
34.
Zurück zum Zitat Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235CrossRef Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235CrossRef
Metadaten
Titel
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks
verfasst von
Fan Wu
Lili Xu
Saru Kumari
Xiong Li
Muhammad Khurram Khan
Ashok Kumar Das
Publikationsdatum
19.11.2016
Verlag
Springer Paris
Erschienen in
Annals of Telecommunications / Ausgabe 3-4/2017
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-016-0547-2

Weitere Artikel der Ausgabe 3-4/2017

Annals of Telecommunications 3-4/2017 Zur Ausgabe

Premium Partner