Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 2/2022

14-07-2021 | Research Article-Computer Engineering and Computer Science

A Secure and Privacy-Preserving Mutual Authentication System for Global Roaming in Mobile Networks

Authors: R. Shashidhara, M. Lajuvanthi, S. Akhila

Published in: Arabian Journal for Science and Engineering | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mutual authentication scheme plays a significant role in the global mobility network to afford roaming service. However, designing secure and privacy-preserving authentication protocols for roaming service is always challenging. Due to the nature of wireless communication medium, these networks are vulnerable to security threats. In recent times, some authentication systems have been proposed for the mobile user roaming in the mobility environments. Nevertheless, most of the security protocols are prone to security attacks. In this paper, a secure mutual authentication protocol is designed using lightweight cryptographic primitives. The protocol design includes initialization phase, registration phase, mutual authentication phase, and the password change phase to ensure the user anonymity, privacy, and security in global mobility networks. In addition, we used a popular formal verification tool called AVISPA (Automated Validation of Internet Security Protocols and Applications) to check the correctness of the proposed protocol. Notably, the formal security analysis has been carried out through BAN logic, which proves the security strength of the proposed framework. Finally, a performance analysis shows that the proposed authentication system preserves low computational and communication overheads.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jiang, Q.; Ma, J.; Li, G.; Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477–1491 (2013)CrossRef Jiang, Q.; Ma, J.; Li, G.; Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477–1491 (2013)CrossRef
2.
go back to reference Suzuki, S.; Nakada, K.: An authentication technique based on distributed security management for the global mobility network. Sel. Areas Commun. IEEE J. 15(8), 1608–1617 (1997)CrossRef Suzuki, S.; Nakada, K.: An authentication technique based on distributed security management for the global mobility network. Sel. Areas Commun. IEEE J. 15(8), 1608–1617 (1997)CrossRef
3.
go back to reference Karuppiah, M.; Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)CrossRef Karuppiah, M.; Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)CrossRef
4.
go back to reference Ha, J.: An efficient and robust anonymous authentication scheme in global mobility networks. Int. J. Secur. Appl. 9(10), 297–312 (2015) Ha, J.: An efficient and robust anonymous authentication scheme in global mobility networks. Int. J. Secur. Appl. 9(10), 297–312 (2015)
5.
go back to reference Li, C.; Lee, C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1), 35–44 (2012)MathSciNetCrossRef Li, C.; Lee, C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1), 35–44 (2012)MathSciNetCrossRef
6.
go back to reference He, D.; Ma, M.; Zhang, Y.; Chen, C.; Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)CrossRef He, D.; Ma, M.; Zhang, Y.; Chen, C.; Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)CrossRef
7.
go back to reference Zhao, D.; Peng, H.; Li, L.; Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers Commun. 78(1), 247–269 (2014)CrossRef Zhao, D.; Peng, H.; Li, L.; Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers Commun. 78(1), 247–269 (2014)CrossRef
8.
go back to reference Karuppiah, M.; Kumari, S.; Li, X.; Wu, F.; Das, A.K.; Khan, M.K.; Saravanan, R.; Basu, S.: A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 93(2), 383–407 (2017)CrossRef Karuppiah, M.; Kumari, S.; Li, X.; Wu, F.; Das, A.K.; Khan, M.K.; Saravanan, R.; Basu, S.: A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 93(2), 383–407 (2017)CrossRef
9.
go back to reference Hao, Z.; Zhong, S.; Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)CrossRef Hao, Z.; Zhong, S.; Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)CrossRef
10.
go back to reference Wen, F.; Susilo, W.; Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993–1004 (2013)CrossRef Wen, F.; Susilo, W.; Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993–1004 (2013)CrossRef
11.
go back to reference Wang, D.; He, D.; Wang, P.; Chu, C.-H.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Depend. Secure Comput. 12(4), 428–442 (2015)CrossRef Wang, D.; He, D.; Wang, P.; Chu, C.-H.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Depend. Secure Comput. 12(4), 428–442 (2015)CrossRef
12.
go back to reference Madhusudhan, R., et al.: An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security, pp. 119–126 (2016). ACM Madhusudhan, R., et al.: An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security, pp. 119–126 (2016). ACM
13.
go back to reference Lee, C.; Hwang, M.; Liao, E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. Ind. Electron. IEEE Trans. 53(5), 1683–1687 (2006)CrossRef Lee, C.; Hwang, M.; Liao, E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. Ind. Electron. IEEE Trans. 53(5), 1683–1687 (2006)CrossRef
14.
go back to reference Kang, D.; Jung, J.; Mun, J.; Lee, D.; Choi, Y.; Won, D.: Efficient and robust user authentication scheme that achieve user anonymity with a markov chain. Secur. Commun. Netw. 9(11), 1462–1476 (2016)CrossRef Kang, D.; Jung, J.; Mun, J.; Lee, D.; Choi, Y.; Won, D.: Efficient and robust user authentication scheme that achieve user anonymity with a markov chain. Secur. Commun. Netw. 9(11), 1462–1476 (2016)CrossRef
15.
go back to reference Gope, P.; Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), 1370–1379 (2016)CrossRef Gope, P.; Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), 1370–1379 (2016)CrossRef
16.
go back to reference Wu, F.; Xu, L.; Kumari, S.; Li, X.; Das, A.K.; Khan, M.K.; Karuppiah, M.; Baliyan, R.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9(16), 3527–3542 (2016)CrossRef Wu, F.; Xu, L.; Kumari, S.; Li, X.; Das, A.K.; Khan, M.K.; Karuppiah, M.; Baliyan, R.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9(16), 3527–3542 (2016)CrossRef
17.
go back to reference Gope, P.; Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62, 1–8 (2016)CrossRef Gope, P.; Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62, 1–8 (2016)CrossRef
18.
go back to reference Guo, D.; Wen, F.: A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw. Secur. 18(2), 217–223 (2016) Guo, D.; Wen, F.: A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw. Secur. 18(2), 217–223 (2016)
19.
go back to reference Wu, F.; Xu, L.; Kumari, S.; Li, X.; Khan, M.K.; Das, A.K.: An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. Telecommun. 72(3–4), 131–144 (2017)CrossRef Wu, F.; Xu, L.; Kumari, S.; Li, X.; Khan, M.K.; Das, A.K.: An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. Telecommun. 72(3–4), 131–144 (2017)CrossRef
20.
go back to reference Arshad, H., Rasoolzadegan, A.: A secure authentication and key agreement scheme for roaming service with user anonymity. Int. J. Commun. Syst. (2017) Arshad, H., Rasoolzadegan, A.: A secure authentication and key agreement scheme for roaming service with user anonymity. Int. J. Commun. Syst. (2017)
21.
go back to reference Wu, F.; Li, X.; Xu, L.; Kumari, S.; Sangaiah, A.K.: A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68, 107–118 (2018)CrossRef Wu, F.; Li, X.; Xu, L.; Kumari, S.; Sangaiah, A.K.: A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68, 107–118 (2018)CrossRef
22.
go back to reference Madhusudhan, R.; et al.: A secure and lightweight authentication scheme for roaming service in global mobile networks. J. Inform. Secur. Appl. 38, 96–110 (2018) Madhusudhan, R.; et al.: A secure and lightweight authentication scheme for roaming service in global mobile networks. J. Inform. Secur. Appl. 38, 96–110 (2018)
23.
go back to reference Lee, C.-C.; Lai, Y.; Chen, C.; Chen, S.-D.: Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. An Int. J. 94(3), 1281–1296 (2017)CrossRef Lee, C.-C.; Lai, Y.; Chen, C.; Chen, S.-D.: Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. An Int. J. 94(3), 1281–1296 (2017)CrossRef
24.
go back to reference Shashidhara, R., Bojjagani, S., Maurya, A.K., Kumari, S., Xiong, H.: A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 1–24,(2020) Shashidhara, R., Bojjagani, S., Maurya, A.K., Kumari, S., Xiong, H.: A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 1–24,(2020)
25.
go back to reference Madhusudhan, R.; Shashidhara, R.: A novel dna based password authentication system for global roaming in resource-limited mobile environments. Multimedia Tools Appl. 79(3), 2185–2212 (2020)CrossRef Madhusudhan, R.; Shashidhara, R.: A novel dna based password authentication system for global roaming in resource-limited mobile environments. Multimedia Tools Appl. 79(3), 2185–2212 (2020)CrossRef
26.
go back to reference Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—-CRYPTO’99, pp. 388–397 (1999). Springer Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—-CRYPTO’99, pp. 388–397 (1999). Springer
27.
go back to reference Mun, H.; Han, K.; Lee, Y.S.; Yeun, C.Y.; Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1), 214–222 (2012)MathSciNetCrossRef Mun, H.; Han, K.; Lee, Y.S.; Yeun, C.Y.; Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1), 214–222 (2012)MathSciNetCrossRef
28.
go back to reference Burrows, M., Abadi, M.: A logic of authentication. In: Proc. R. Soc. Lond. A, vol. 426, pp. 233–271 (1989). The Royal Society Burrows, M., Abadi, M.: A logic of authentication. In: Proc. R. Soc. Lond. A, vol. 426, pp. 233–271 (1989). The Royal Society
29.
go back to reference Armando, A., Basin, D., Cuellar, J., Rusinowitch, M., Viganò, L.: Avispa: automated validation of internet security protocols and applications. ERCIM News 64,(2006) Armando, A., Basin, D., Cuellar, J., Rusinowitch, M., Viganò, L.: Avispa: automated validation of internet security protocols and applications. ERCIM News 64,(2006)
30.
go back to reference Basin, D.; Mödersheim, S.; Vigano, L.: Ofmc: a symbolic model checker for security protocols. Int. J. Inform. Secur. 4(3), 181–208 (2005)CrossRef Basin, D.; Mödersheim, S.; Vigano, L.: Ofmc: a symbolic model checker for security protocols. Int. J. Inform. Secur. 4(3), 181–208 (2005)CrossRef
31.
32.
go back to reference Glouche, Y., Genet, T., Heen, O., Courtay, O.: A security protocol animator tool for avispa. In: ARTIST2 workshop on security specification and verification of embedded systems, Pisa (2006) Glouche, Y., Genet, T., Heen, O., Courtay, O.: A security protocol animator tool for avispa. In: ARTIST2 workshop on security specification and verification of embedded systems, Pisa (2006)
Metadata
Title
A Secure and Privacy-Preserving Mutual Authentication System for Global Roaming in Mobile Networks
Authors
R. Shashidhara
M. Lajuvanthi
S. Akhila
Publication date
14-07-2021
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 2/2022
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-05940-w

Other articles of this Issue 2/2022

Arabian Journal for Science and Engineering 2/2022 Go to the issue

Research Article-Computer Engineering and Computer Science

An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems

Research Article-Computer Engineering and Computer Science

Progress of IoT Research Technologies and Applications Serving Hajj and Umrah

Research Article-Computer Engineering and Computer Science

A Model-Driven Framework for the Development of MVC-Based (Web) Application

Research Article-Computer Engineering and Computer Science

Bipolar Mating Tendency: Harmony Between the Best and the Worst Individuals

Premium Partners