Skip to main content
Top

2018 | OriginalPaper | Chapter

Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

For secure communications in mobile communication networks, various authenticated key exchange schemes are proposed to provide the remote client authentication and the session key establishment. In these schemes, more considerations are to reduce the costs of remote mobile clients, but not those of the server. However, the server has become a bottleneck in large-scale mobile communication networks. In this paper, in order to relieve the server’s load, we presented an efficient authentication protocol with key exchange between the remote client and the server, and then generalized it to a three-party case, in which two remote clients can authenticate each other with the server’s help and share a secure session key. Compared with the relevant protocols, the proposed protocols require lower computation and communication costs, and above all, dramatically reduce those of the server. Therefore, the proposed protocols are more practical and suitable for large-scale mobile communication networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abi-Char, P.E., El-Hassan, B., Mhamed, A.: A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: Proceedings of the 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 235–240. IEEE, New York (2007) Abi-Char, P.E., El-Hassan, B., Mhamed, A.: A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: Proceedings of the 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 235–240. IEEE, New York (2007)
2.
go back to reference Chen, Z.G., Song, X.X.: A distributed electronic authentication scheme based on elliptic curve. In: Proceedings of the Sixth International on Machine Learning and Cybernetics, pp. 2179–2182. IEEE, New York (2007) Chen, Z.G., Song, X.X.: A distributed electronic authentication scheme based on elliptic curve. In: Proceedings of the Sixth International on Machine Learning and Cybernetics, pp. 2179–2182. IEEE, New York (2007)
3.
go back to reference Jiang, C., Li, B., Xu, H.: An efficient scheme for user authentication in wireless sensor networks. In: Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 438–442. IEEE, New York (2007) Jiang, C., Li, B., Xu, H.: An efficient scheme for user authentication in wireless sensor networks. In: Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 438–442. IEEE, New York (2007)
6.
go back to reference Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)CrossRefMATHMathSciNet Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)CrossRefMATHMathSciNet
7.
go back to reference ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. IT 31, 469–472 (1985)CrossRefMATHMathSciNet ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. IT 31, 469–472 (1985)CrossRefMATHMathSciNet
9.
go back to reference Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3–4), 138–143 (2009)CrossRef Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3–4), 138–143 (2009)CrossRef
10.
go back to reference Yoon, E.J., Yoo, K.Y.: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proceeding of 2009 International Conference on Computational Science and Engineering, vol. 02, pp. 633–640. IEEE Computer Society, Washington, DC, USA (2009) Yoon, E.J., Yoo, K.Y.: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proceeding of 2009 International Conference on Computational Science and Engineering, vol. 02, pp. 633–640. IEEE Computer Society, Washington, DC, USA (2009)
11.
go back to reference He, D., Chen, J., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)CrossRef He, D., Chen, J., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)CrossRef
12.
go back to reference Yoon, E.J., Choi, S.B., Yoo, K.Y.: A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int. J. Innov. Comput. Inf. Control 8(4), 2637–2653 (2012) Yoon, E.J., Choi, S.B., Yoo, K.Y.: A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int. J. Innov. Comput. Inf. Control 8(4), 2637–2653 (2012)
13.
go back to reference He, D.: An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Netw. 10, 1009–1016 (2012)CrossRef He, D.: An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Netw. 10, 1009–1016 (2012)CrossRef
14.
go back to reference Wang, D., Ma, C.G.: Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC. Inf. Fusion 14(4), 498–503 (2013)CrossRef Wang, D., Ma, C.G.: Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC. Inf. Fusion 14(4), 498–503 (2013)CrossRef
15.
go back to reference Islam, S.K.H., Biswas, G.P.: A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11), 1892–1898 (2011)CrossRef Islam, S.K.H., Biswas, G.P.: A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11), 1892–1898 (2011)CrossRef
16.
go back to reference Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19, 282–294 (2014) Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19, 282–294 (2014)
17.
go back to reference Yang, J.H., Chang, C.C.: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Syst. Softw. 82(9), 1497–1502 (2009)CrossRef Yang, J.H., Chang, C.C.: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Syst. Softw. 82(9), 1497–1502 (2009)CrossRef
18.
go back to reference Chen, T.H., Lee, W.B., Chen, H.B.: A round-and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9), 1581–1590 (2008)CrossRef Chen, T.H., Lee, W.B., Chen, H.B.: A round-and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9), 1581–1590 (2008)CrossRef
19.
go back to reference Tan, Z.: An enhanced three-party authentication key exchange protocol for mobile commerce environments. J. Commun. 5(5), 436–443 (2010)CrossRef Tan, Z.: An enhanced three-party authentication key exchange protocol for mobile commerce environments. J. Commun. 5(5), 436–443 (2010)CrossRef
21.
go back to reference He, D., Chen, Y., Chen, J.: An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Comput. Eng. Comput. Sci. 38, 2055–2061 (2013)MATHMathSciNet He, D., Chen, Y., Chen, J.: An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Comput. Eng. Comput. Sci. 38, 2055–2061 (2013)MATHMathSciNet
22.
go back to reference Chou, C.H., Tsai, K.Y., Lu, C.F.: Two ID-based authenticated schemes with key agreement for mobile environments. J. Supercomput. 66(2), 973–988 (2013)CrossRef Chou, C.H., Tsai, K.Y., Lu, C.F.: Two ID-based authenticated schemes with key agreement for mobile environments. J. Supercomput. 66(2), 973–988 (2013)CrossRef
23.
go back to reference Farash, M.S., Attari, M.A.: A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J. Supercomput. 69(1), 395–411 (2014)CrossRef Farash, M.S., Attari, M.A.: A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J. Supercomput. 69(1), 395–411 (2014)CrossRef
24.
go back to reference Shi, R.H., Zhong, H., Zhang, S.: Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks. J. Supercomput. 71(11), 4015–4018 (2015)CrossRef Shi, R.H., Zhong, H., Zhang, S.: Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks. J. Supercomput. 71(11), 4015–4018 (2015)CrossRef
26.
go back to reference Yao, A.C.C., Zhao, Y.: Privacy-preserving authenticated key-exchange over internet. IEEE Trans. Inf. Forensics Security 9(1), 125–140 (2014)CrossRef Yao, A.C.C., Zhao, Y.: Privacy-preserving authenticated key-exchange over internet. IEEE Trans. Inf. Forensics Security 9(1), 125–140 (2014)CrossRef
Metadata
Title
Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks
Authors
Run-hua Shi
Shun Zhang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-69605-8_19

Premium Partner