Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2020

31-01-2019

Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET

Authors: R. Madhusudhan, Shashidhara R.

Published in: Peer-to-Peer Networking and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In GLObal MObile NETwork (GLOMONET), it is essential to authenticate and provide secure communication between a user, foreign agent, and the home agent using session key. Designing a secure and efficient authentication protocol for roaming users in the mobile network is a challenging. In order to secure communication over an insecure channel, a number of authentication schemes have been proposed. The main weakness of the existing authentication protocols is that attackers have the ability to impersonate a legal user at any time. In addition, the existing protocols are vulnerable to various kind of cryptographic attacks such as insider attack, bit flipping attack, forgery attacks, denial-of-service attack, unfair key agreement and cannot provide user’s anonymity. To remedy these weaknesses and to achieve low communication and computation costs, we proposed a secure authentication scheme for roaming users. In addition, the formal verification tools ProVerif and AVISPA is used to check the correctness of the proposed protocol. Finally, the performance evaluation and simulation results shows that the proposed scheme is efficient in terms of communication and computational cost.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lee C-C, Hwang M-S, Liao I-E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687CrossRef Lee C-C, Hwang M-S, Liao I-E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687CrossRef
2.
go back to reference Li C-T, Lee C-C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44MathSciNetMATHCrossRef Li C-T, Lee C-C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44MathSciNetMATHCrossRef
3.
go back to reference Ma C-G, Wang D, Zhao S-D (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215–2227CrossRef Ma C-G, Wang D, Zhao S-D (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215–2227CrossRef
4.
go back to reference Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82(4):2231–2245CrossRef Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82(4):2231–2245CrossRef
5.
go back to reference He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374CrossRef He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374CrossRef
6.
go back to reference Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491CrossRef Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491CrossRef
7.
go back to reference Suzuki S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617CrossRef Suzuki S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617CrossRef
8.
go back to reference Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84(3):2055–2078CrossRef Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84(3):2055–2078CrossRef
9.
go back to reference Samfat D, Molva R, Asokan N (1995) Untraceability in mobile networks. In: Proceedings of the 1st annual international conference on mobile computing and networking, ACM, pp 26–36 Samfat D, Molva R, Asokan N (1995) Untraceability in mobile networks. In: Proceedings of the 1st annual international conference on mobile computing and networking, ACM, pp 26–36
10.
go back to reference Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. International Journal of Security and Its Applications 9(10):297–312CrossRef Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. International Journal of Security and Its Applications 9(10):297–312CrossRef
11.
go back to reference Yoon E-J, Yoo K-Y, Ha K-S (2011) A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364CrossRef Yoon E-J, Yoo K-Y, Ha K-S (2011) A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364CrossRef
12.
go back to reference Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247–269CrossRef Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247–269CrossRef
13.
go back to reference Chang C-C, Lee C-Y, Chiu Y-C (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618CrossRef Chang C-C, Lee C-Y, Chiu Y-C (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618CrossRef
14.
go back to reference Youn T-Y, Park Y-H, Lim J (2009) Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun Lett 13(7):471–473CrossRef Youn T-Y, Park Y-H, Lim J (2009) Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun Lett 13(7):471–473CrossRef
15.
go back to reference Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: A progress report. In: Computer aided verification,Springer, pp 35–49CrossRef Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: A progress report. In: Computer aided verification,Springer, pp 35–49CrossRef
16.
go back to reference Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235CrossRef Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235CrossRef
17.
go back to reference Wu C-C, Lee W-B, Tsaur W-J, et al (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRef Wu C-C, Lee W-B, Tsaur W-J, et al (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRef
18.
go back to reference Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004CrossRef Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004CrossRef
19.
go back to reference Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222MathSciNetMATHCrossRef Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222MathSciNetMATHCrossRef
20.
go back to reference Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8CrossRef Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8CrossRef
21.
go back to reference Guo D, Wen F (2016) A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw Secur 18(2):217–223 Guo D, Wen F (2016) A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw Secur 18(2):217–223
22.
go back to reference Madhusudhan R et al (2016) An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security, ACM, pp 119–126 Madhusudhan R et al (2016) An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security, ACM, pp 119–126
23.
go back to reference Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann Telecommun 72(3-4):131–144CrossRef Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann Telecommun 72(3-4):131–144CrossRef
24.
go back to reference Madhusudhan R, et al (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. Journal of Information Security and Applications 38:96– 110CrossRef Madhusudhan R, et al (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. Journal of Information Security and Applications 38:96– 110CrossRef
25.
go back to reference Jeon W, Lee Y, Won D (2013) An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications 7(4):1–5 Jeon W, Lee Y, Won D (2013) An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications 7(4):1–5
26.
go back to reference Kuo W-C, Wei H-J, Cheng J-C (2014) An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications 19(1):18–24CrossRef Kuo W-C, Wei H-J, Cheng J-C (2014) An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications 19(1):18–24CrossRef
27.
go back to reference Lee C-C, Lai Y, Chen C, Chen S-D (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun: An Int J 94(3):1281–1296CrossRef Lee C-C, Lai Y, Chen C, Chen S-D (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun: An Int J 94(3):1281–1296CrossRef
28.
go back to reference Xu J, Zhu W-T, Feng D-G (2009) An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4):723–728CrossRef Xu J, Zhu W-T, Feng D-G (2009) An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4):723–728CrossRef
29.
go back to reference Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO’99, Springer, pp 388–397 Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO’99, Springer, pp 388–397
30.
go back to reference Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Commun 51(5):541–552MathSciNetMATH Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Commun 51(5):541–552MathSciNetMATH
31.
go back to reference Xie Q, Hu B, Tan X, Wong DS (2017) Chaotic maps-based strong anonymous authentication scheme for roaming services in global mobility networks. Wirel Pers Commun 96(4):5881–5896.CrossRef Xie Q, Hu B, Tan X, Wong DS (2017) Chaotic maps-based strong anonymous authentication scheme for roaming services in global mobility networks. Wirel Pers Commun 96(4):5881–5896.CrossRef
32.
go back to reference Bojjagani S, Sastry V (2017) A secure end-to-end sms-based mobile banking protocol. Int J Commun Syst 30(15):3302CrossRef Bojjagani S, Sastry V (2017) A secure end-to-end sms-based mobile banking protocol. Int J Commun Syst 30(15):3302CrossRef
33.
go back to reference Dalal N, Shah J, Hisaria K, Jinwala D (2010) A comparative analysis of tools for verification of security protocols. Int J Commun Netw Syst Sci 3(10):779 Dalal N, Shah J, Hisaria K, Jinwala D (2010) A comparative analysis of tools for verification of security protocols. Int J Commun Netw Syst Sci 3(10):779
34.
go back to reference Odelu V, Das AK, Kumari S, Huang X, Wazid M (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Futur Gener Comput Syst 68:74– 88CrossRef Odelu V, Das AK, Kumari S, Huang X, Wazid M (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Futur Gener Comput Syst 68:74– 88CrossRef
Metadata
Title
Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
Authors
R. Madhusudhan
Shashidhara R.
Publication date
31-01-2019
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-0717-x

Other articles of this Issue 1/2020

Peer-to-Peer Networking and Applications 1/2020 Go to the issue

Premium Partner