Skip to main content

2022 | OriginalPaper | Buchkapitel

36. Comments on “A Robust User Authentication Protocol with Privacy-Preserving for Roaming Service in Mobility Environments”

verfasst von : Xinglan Guo, Lei Yang, Tsu-Yang Wu, Lili Chen, Chien-Ming Chen

Erschienen in: Advances in Smart Vehicular Technology, Transportation, Communication and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Roaming service under the global mobile network (GLOMONET) means that users who use mobile devices can still use mobile devices in other regions or countries after leaving their region or country. When mobile users use roaming services, the communication information transmitted by wireless channels is easy to be tampered with and eavesdropped on by attackers. These attacks may expose the identity and location of remote users. Thus, mutual authentication among mobile users, foreign agents, and home agents play an important role. To ensure a secure roaming service in a mobile network, it is necessary to design an efficient and secure solution. Recently, Shashidhara et al. proposed a user authentication protocol for roaming service in the GLOMONET. In this paper, we find that there are some security vulnerabilities in their protocol, including perfect forward secrecy (PFS), key compromise impersonation attacks (KCIA), and known-session-specific temporary information attacks (KTIA).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alveras, D., Grotschel, M., Jonas, P., Paul, U.: Survivable mobile phone network architectures: models and solution methods. IEEE Commun. Mag. 36(3), 88–93 (1998)CrossRef Alveras, D., Grotschel, M., Jonas, P., Paul, U.: Survivable mobile phone network architectures: models and solution methods. IEEE Commun. Mag. 36(3), 88–93 (1998)CrossRef
2.
Zurück zum Zitat Buttyan, L., Gbaguidi, C.: Extensions to an authentication technique proposed for the global mobility network. IEEE Trans. Commun. 48(3), 373–376 (2000)CrossRef Buttyan, L., Gbaguidi, C.: Extensions to an authentication technique proposed for the global mobility network. IEEE Trans. Commun. 48(3), 373–376 (2000)CrossRef
3.
Zurück zum Zitat Chang, C.C., Lee, C.Y., Chiu, Y.C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4), 611–618 (2009)CrossRef Chang, C.C., Lee, C.Y., Chiu, Y.C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4), 611–618 (2009)CrossRef
4.
Zurück zum Zitat Chen, C.M., Xu, L., Wang, K.H., Liu, S., Wu, T.Y.: Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps. J. Int. Technol. 19(3), 679–687 (2018) Chen, C.M., Xu, L., Wang, K.H., Liu, S., Wu, T.Y.: Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps. J. Int. Technol. 19(3), 679–687 (2018)
5.
Zurück zum Zitat Chen, C.M., Wang, K.H., Fang, W., Wu, T.Y., Wang, E.K.: Reconsidering a lightweight anonymous authentication protocol. J. Chin. Inst. Eng. 42(1), 9–14 (2019)CrossRef Chen, C.M., Wang, K.H., Fang, W., Wu, T.Y., Wang, E.K.: Reconsidering a lightweight anonymous authentication protocol. J. Chin. Inst. Eng. 42(1), 9–14 (2019)CrossRef
6.
Zurück zum Zitat Chen, C.M., Xiang, B., Wang, K.H., Yeh, K.H., Wu, T.Y.: A robust mutual authentication with a key agreement scheme for session initiation protocol. Appl. Sci. 8(10), 1789 (2018)CrossRef Chen, C.M., Xiang, B., Wang, K.H., Yeh, K.H., Wu, T.Y.: A robust mutual authentication with a key agreement scheme for session initiation protocol. Appl. Sci. 8(10), 1789 (2018)CrossRef
7.
Zurück zum Zitat Chen, C.M., Xiang, B., Wang, K.H., Zhang, Y., Wu, T.Y.: An efficient and secure smart card based authentication scheme. J. Int. Technol. 20(4), 1113–1123 (2019) Chen, C.M., Xiang, B., Wang, K.H., Zhang, Y., Wu, T.Y.: An efficient and secure smart card based authentication scheme. J. Int. Technol. 20(4), 1113–1123 (2019)
8.
Zurück zum Zitat Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), 1370–1379 (2016)CrossRef Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), 1370–1379 (2016)CrossRef
9.
Zurück zum Zitat Hwang, K.F., Chang, C.C.: A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans. Wirel. Commun. 2(2), 400–407 (2003)CrossRef Hwang, K.F., Chang, C.C.: A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans. Wirel. Commun. 2(2), 400–407 (2003)CrossRef
10.
Zurück zum Zitat Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84, 2055–2078 (2015)CrossRef Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84, 2055–2078 (2015)CrossRef
11.
Zurück zum Zitat Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683–1687 (2006)CrossRef Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683–1687 (2006)CrossRef
12.
Zurück zum Zitat Lee, C.C., Yang, C.C., Hwang, M.S.: A new privacy and authentication protocol for end-to-end mobile users. Int. J. Commun. Syst. 16(9), 799–808 (2003)CrossRef Lee, C.C., Yang, C.C., Hwang, M.S.: A new privacy and authentication protocol for end-to-end mobile users. Int. J. Commun. Syst. 16(9), 799–808 (2003)CrossRef
13.
Zurück zum Zitat Shashidhara, R., Bojjagani, S., Maurya, A.K., Kumari, S., Xiong, H.: A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-peer networking and applications 13, 1943–1966 (2020)CrossRef Shashidhara, R., Bojjagani, S., Maurya, A.K., Kumari, S., Xiong, H.: A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-peer networking and applications 13, 1943–1966 (2020)CrossRef
14.
Zurück zum Zitat Suzuki, S., Nakada, K.: An authentication technique based on distributed security management for the global mobility network. IEEE J. Sel. Areas Commun. 15(8), 1608–1617 (1997)CrossRef Suzuki, S., Nakada, K.: An authentication technique based on distributed security management for the global mobility network. IEEE J. Sel. Areas Commun. 15(8), 1608–1617 (1997)CrossRef
15.
Zurück zum Zitat Tzeng, Z.J., Tzeng, W.G.: Authentication of mobile users in third generation mobile systems. Wirel. Pers. Commun. 16, 35–50 (2001)CrossRef Tzeng, Z.J., Tzeng, W.G.: Authentication of mobile users in third generation mobile systems. Wirel. Pers. Commun. 16, 35–50 (2001)CrossRef
16.
Zurück zum Zitat Wang, Y., Liu, Y., Ma, H., Ma, Q., Ding, Q.: The research of identity authentication based on multiple biometrics fusion in complex interactive environment. J. Netw. Intell. 4(4), 124–139 (2019) Wang, Y., Liu, Y., Ma, H., Ma, Q., Ding, Q.: The research of identity authentication based on multiple biometrics fusion in complex interactive environment. J. Netw. Intell. 4(4), 124–139 (2019)
18.
Zurück zum Zitat Wu, T.Y., Lee, Z., Obaidat, M.S., Kumari, S., Chen, C.M.: An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8, 28018–28096 (2020) Wu, T.Y., Lee, Z., Obaidat, M.S., Kumari, S., Chen, C.M.: An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8, 28018–28096 (2020)
20.
Zurück zum Zitat Wu, T.Y., Wang, T., Lee, Y.Q., Zheng, W., Kumari, S., Kumar, S.: Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur. Commun. Netw. 2021, 6658041 (2021) Wu, T.Y., Wang, T., Lee, Y.Q., Zheng, W., Kumari, S., Kumar, S.: Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur. Commun. Netw. 2021, 6658041 (2021)
21.
Zurück zum Zitat Wu, T.Y., Yang, L., Lee, Z., Chen, C.M., Islam, S.H.: Improved ECC-based three-factor multiserver authentication scheme. Secur. Commun. Netw. 2021, 6627956 (2021) Wu, T.Y., Yang, L., Lee, Z., Chen, C.M., Islam, S.H.: Improved ECC-based three-factor multiserver authentication scheme. Secur. Commun. Netw. 2021, 6627956 (2021)
22.
Zurück zum Zitat Xu, G., Liu, J., Lu, Y., Zeng, X., Zhang, Y., Li, X.: A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks. J. Netw. Comput. Appl. 107, 83–92 (2018)CrossRef Xu, G., Liu, J., Lu, Y., Zeng, X., Zhang, Y., Li, X.: A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks. J. Netw. Comput. Appl. 107, 83–92 (2018)CrossRef
23.
Zurück zum Zitat Zhou, T., Xu, J.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205–213 (2011)CrossRef Zhou, T., Xu, J.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205–213 (2011)CrossRef
Metadaten
Titel
Comments on “A Robust User Authentication Protocol with Privacy-Preserving for Roaming Service in Mobility Environments”
verfasst von
Xinglan Guo
Lei Yang
Tsu-Yang Wu
Lili Chen
Chien-Ming Chen
Copyright-Jahr
2022
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-4039-1_36

    Premium Partner