Skip to main content

2020 | OriginalPaper | Buchkapitel

A Mobile User Authentication Technique in Global Mobility Network

verfasst von : Sudip Kumar Palit, Mohuya Chakraborty

Erschienen in: Proceedings of International Ethical Hacking Conference 2019

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Anonymous user authentication always is a paramount job in global mobility network (GLOMONET). In GLOMONET, a mobile user can move from one place to another place causes changes of mobile network from one to another. As authentication server can authenticate only its registered users, it cannot verify other mobile users. Furthermore, in global mobility network, communication channel is public. An adversary of the network can get access of all transmitted messages over the channel. In such a situation, several network security attacks can be initiated by an adversary to decrypt the messages. Therefore, mobile users as well as network provider’s information may come in risk. A robust anonymous user authentication and key agreement technique required to ensure the protection of such information. Several authentication protocols have been designed in GLOMONET in recent years. Unfortunately, most of them are unprotected against various network security attacks. Therefore, in this paper, we proposed a rigid authentication protocol in GLOMONET to overcome all the deficiencies of the previous work. Performance analysis of our protocol shows that it is reliable and even more effective compared to other existing protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10), 722–723 (2008)CrossRef Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10), 722–723 (2008)CrossRef
2.
Zurück zum Zitat Zeng, P., Cao, Z., Choo, K.-K. R., Wang, S.: On the anonymity of some authentication schemes for wireless communication. IEEE Commun. Lett. 13(3), March 2009CrossRef Zeng, P., Cao, Z., Choo, K.-K. R., Wang, S.: On the anonymity of some authentication schemes for wireless communication. IEEE Commun. Lett. 13(3), March 2009CrossRef
3.
Zurück zum Zitat Chang, C.-C., Lee, C.-Y., Chiu, Y.-C.: Enhanced authentication scheme with anonymity for roaming service in Global Mobility network. Comput. Commun. 32(4), 611–618 (2009)CrossRef Chang, C.-C., Lee, C.-Y., Chiu, Y.-C.: Enhanced authentication scheme with anonymity for roaming service in Global Mobility network. Comput. Commun. 32(4), 611–618 (2009)CrossRef
4.
Zurück zum Zitat Zhou, T., Xu, J.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205–213 (2011)MathSciNetCrossRef Zhou, T., Xu, J.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205–213 (2011)MathSciNetCrossRef
5.
Zurück zum Zitat Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1–2), 214–222 (2012)MathSciNetCrossRef Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1–2), 214–222 (2012)MathSciNetCrossRef
7.
Zurück zum Zitat Kim, J., Kwak, J.: Improved secure anonymous authentication scheme for roaming service in global mobile network. Int. J. Security Appl. 6(3), 45–54 (2012) Kim, J., Kwak, J.: Improved secure anonymous authentication scheme for roaming service in global mobile network. Int. J. Security Appl. 6(3), 45–54 (2012)
8.
Zurück zum Zitat Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wireless Pers. Commun. 68(4), 1477–1491 (2013)CrossRef Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wireless Pers. Commun. 68(4), 1477–1491 (2013)CrossRef
9.
Zurück zum Zitat Lee, T.-F.: User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks. Commun. Netw. 6(11), 1404–1413 (2013)CrossRef Lee, T.-F.: User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks. Commun. Netw. 6(11), 1404–1413 (2013)CrossRef
10.
Zurück zum Zitat He, D., Zhang, Y., Chen, J.: Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Pers. Commun. 74(2), 229–243 (2014)CrossRef He, D., Zhang, Y., Chen, J.: Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Pers. Commun. 74(2), 229–243 (2014)CrossRef
11.
Zurück zum Zitat Wen, F., Susilo, W., Yang, G.: A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun. 73(3), 993–1004 (2013)CrossRef Wen, F., Susilo, W., Yang, G.: A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun. 73(3), 993–1004 (2013)CrossRef
13.
Zurück zum Zitat Kuo, W.-C., Wei, H.-J., Cheng, J.-C.: An efficient and secure anonymous mobility network authentication scheme. J. Inf. Secur. Appl. 19, 18–24 (2014)CrossRef Kuo, W.-C., Wei, H.-J., Cheng, J.-C.: An efficient and secure anonymous mobility network authentication scheme. J. Inf. Secur. Appl. 19, 18–24 (2014)CrossRef
15.
Zurück zum Zitat Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), December 2016CrossRef Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), December 2016CrossRef
16.
Zurück zum Zitat Karuppiah, M., Kumari, S., Das, A.K., Li, X., Wu, F., Basu, S.: A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Netw. 9(17), 4192–4209 (2016)CrossRef Karuppiah, M., Kumari, S., Das, A.K., Li, X., Wu, F., Basu, S.: A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Netw. 9(17), 4192–4209 (2016)CrossRef
17.
Zurück zum Zitat Gope, P., Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62, 1–8 (2016) Gope, P., Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62, 1–8 (2016)
18.
Zurück zum Zitat Xu, L., Wu, F.: A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks. Secur. Commun. Netw. 9(16), 3428–3443 (2016)CrossRef Xu, L., Wu, F.: A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks. Secur. Commun. Netw. 9(16), 3428–3443 (2016)CrossRef
19.
Zurück zum Zitat Arshad, H., Rasoolzadegan, A.: A secure authentication and key agreement scheme for roaming service with user anonymity. Int. J. Commun. Syst. 30(18), e3361 (2017)CrossRef Arshad, H., Rasoolzadegan, A.: A secure authentication and key agreement scheme for roaming service with user anonymity. Int. J. Commun. Syst. 30(18), e3361 (2017)CrossRef
20.
Zurück zum Zitat Madhusudhan, R., Suvidha, K.S.: An efficient and secure user authentication scheme with anonymity in global mobility networks. In: Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 19–24, Mar 2017 Madhusudhan, R., Suvidha, K.S.: An efficient and secure user authentication scheme with anonymity in global mobility networks. In: Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 19–24, Mar 2017
21.
Zurück zum Zitat Lee, C.-C., Lai, Y.-M., Chen, C.-T., Chen, S.-D.: Advanced secure anonymous authentication scheme for roaming service in global mobility network. Wireless Pers. Commun. 94(3), 1281–1296 (2017)CrossRef Lee, C.-C., Lai, Y.-M., Chen, C.-T., Chen, S.-D.: Advanced secure anonymous authentication scheme for roaming service in global mobility network. Wireless Pers. Commun. 94(3), 1281–1296 (2017)CrossRef
23.
Zurück zum Zitat Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference, Santa Barbara, CA, USA, pp. 388–397, August 1999 Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference, Santa Barbara, CA, USA, pp. 388–397, August 1999
24.
Zurück zum Zitat Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552, May 2002MathSciNetCrossRef Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552, May 2002MathSciNetCrossRef
26.
Zurück zum Zitat von Oheimb, D.: The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proceedings of the 3rd APPSEM, Frauenchiemsee, Germany, pp. 1–17 (2005) von Oheimb, D.: The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proceedings of the 3rd APPSEM, Frauenchiemsee, Germany, pp. 1–17 (2005)
Metadaten
Titel
A Mobile User Authentication Technique in Global Mobility Network
verfasst von
Sudip Kumar Palit
Mohuya Chakraborty
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0361-0_14

Neuer Inhalt