Skip to main content
Erschienen in: The Journal of Supercomputing 5/2022

27.10.2021

AUGChain: blockchain-based mobile user authentication scheme in global mobility network

verfasst von: Sudip Kumar Palit, Mohuya Chakraborty, Subhalaxmi Chakraborty

Erschienen in: The Journal of Supercomputing | Ausgabe 5/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication plays a pivotal role for mobile users to provide security and privacy to their personal information while availing the roaming service in Global Mobility Network (GLOMONET). Most of the schemes offered to address authentication-related problems are built on the centralized semi-trusted server. In such type of server, the privacy and the security of mobile users may be compromised. To eradicate such a problem, here, we propose a user authentication scheme known as AUGChain for GLOMONET. The novelty of the work lies in proposing a scheme, to produce a peer-to-peer network, where each participant can directly interact with the information stored in the secure distributed ledger. Therefore, in this proposed scheme, the unnecessary forward of requisite data by a participant is reduced. Hence, not only minimization of communicational overhead is achieved, but also it minimizes the computational time of the whole scheme. The blockchain technology-based implementation is carried out on hyperledger composer along with hyperledger fabric. The security analysis of the proposed scheme has been done using Burrows–Abadi–Needham logic to ensure mutual authentication between the participants. Moreover, the proposed model, AUGChain, outperforms the other existing schemes by resisting different network security attacks like compromised server attacks, DOS, DDOS attacks, reducing communicational costs as well as computational time a significant amount. This has been done by reducing the execution time of the order of 7.5 ms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Refaey A, Hammad K, Magierowski S, Hossain E (2020) A blockchain policy and charging control framework for roaming in cellular networks. IEEE Netw 34(3):170–177CrossRef Refaey A, Hammad K, Magierowski S, Hossain E (2020) A blockchain policy and charging control framework for roaming in cellular networks. IEEE Netw 34(3):170–177CrossRef
3.
Zurück zum Zitat Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 232(50):231–235 Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 232(50):231–235
4.
Zurück zum Zitat Wu C, Lee W, Tsaur W (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRef Wu C, Lee W, Tsaur W (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRef
5.
Zurück zum Zitat Zeng P, Cao Z, Choo K, Wang S (2009) On the anonymity of some authentication schemes for wireless communication. IEEE Commun Lett 13(3):170–171CrossRef Zeng P, Cao Z, Choo K, Wang S (2009) On the anonymity of some authentication schemes for wireless communication. IEEE Commun Lett 13(3):170–171CrossRef
6.
Zurück zum Zitat Zhou T, Xu J (2011) Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput Netw 55(1):205–213CrossRef Zhou T, Xu J (2011) Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput Netw 55(1):205–213CrossRef
7.
Zurück zum Zitat Mun H, Han K, Lee Y, Yeun C, Choi H (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222MathSciNetCrossRef Mun H, Han K, Lee Y, Yeun C, Choi H (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222MathSciNetCrossRef
8.
Zurück zum Zitat Hsieh W, Leu J (2012) Anonymous authentication protocol based on elliptic curve diffiehellman for wireless access networks. Wirel Commun Mob Comput 14:995–1006CrossRef Hsieh W, Leu J (2012) Anonymous authentication protocol based on elliptic curve diffiehellman for wireless access networks. Wirel Commun Mob Comput 14:995–1006CrossRef
9.
Zurück zum Zitat Kim J, Kwak J (2012) Improved secure anonymous authentication scheme for roaming service in global mobile network. Int J Secur Appl 6(3):45–54 Kim J, Kwak J (2012) Improved secure anonymous authentication scheme for roaming service in global mobile network. Int J Secur Appl 6(3):45–54
10.
Zurück zum Zitat Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wirel Pers Commun 68(4):1477–1491CrossRef Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wirel Pers Commun 68(4):1477–1491CrossRef
11.
Zurück zum Zitat He D, Zhang Y, Chen (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243CrossRef He D, Zhang Y, Chen (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243CrossRef
12.
Zurück zum Zitat Wen F, Susilo W, Yang G (2013) A secure and effective user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(9):993–1004CrossRef Wen F, Susilo W, Yang G (2013) A secure and effective user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(9):993–1004CrossRef
13.
Zurück zum Zitat Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78:247–269CrossRef Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78:247–269CrossRef
14.
Zurück zum Zitat Kuo W, Wei H, Cheng J (2014) An efficient and secure anonymous mobility network authentication scheme. J Inf Secur Appl 19:18–24 Kuo W, Wei H, Cheng J (2014) An efficient and secure anonymous mobility network authentication scheme. J Inf Secur Appl 19:18–24
15.
Zurück zum Zitat Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82:2231–2245CrossRef Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82:2231–2245CrossRef
16.
Zurück zum Zitat Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84:20552078CrossRef Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84:20552078CrossRef
17.
Zurück zum Zitat Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8CrossRef Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8CrossRef
18.
Zurück zum Zitat Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 94:1281–1296CrossRef Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 94:1281–1296CrossRef
19.
Zurück zum Zitat Madhusudhan R, Suvidha KS (2017) An efficient and secure user authentication scheme with anonymity in global mobility networks. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp 19–24 Madhusudhan R, Suvidha KS (2017) An efficient and secure user authentication scheme with anonymity in global mobility networks. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp 19–24
20.
Zurück zum Zitat Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125CrossRef Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125CrossRef
21.
Zurück zum Zitat Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118CrossRef Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118CrossRef
22.
Zurück zum Zitat Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465CrossRef Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465CrossRef
23.
Zurück zum Zitat Madhusudhan R, Shashidhara (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110 Madhusudhan R, Shashidhara (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110
24.
Zurück zum Zitat Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565CrossRef Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565CrossRef
25.
Zurück zum Zitat Sohail MM, Hassan M, Mansoor K, Ghani A, Jawad K (2020) An improved authentication protocol for global mobility network (GLOMONET). In: 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp 401–406 Sohail MM, Hassan M, Mansoor K, Ghani A, Jawad K (2020) An improved authentication protocol for global mobility network (GLOMONET). In: 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp 401–406
26.
Zurück zum Zitat Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588 Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588
27.
Zurück zum Zitat Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M (2021) AMAPG: advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271CrossRef Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M (2021) AMAPG: advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271CrossRef
28.
Zurück zum Zitat Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441CrossRef Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441CrossRef
29.
Zurück zum Zitat Hojjati M, Shafieinejad A, Yanikomeroglu H (2020) A Blockchain-based authentication and key agreement (AKA) protocol for 5G networks. IEEE Access 8:216461–216476CrossRef Hojjati M, Shafieinejad A, Yanikomeroglu H (2020) A Blockchain-based authentication and key agreement (AKA) protocol for 5G networks. IEEE Access 8:216461–216476CrossRef
30.
Zurück zum Zitat Haddad Z, Fouda MM, Mahmoud M, Abdallah M (2020) Blockchain-based authentication for 5G networks. In: IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp 189–194 Haddad Z, Fouda MM, Mahmoud M, Abdallah M (2020) Blockchain-based authentication for 5G networks. In: IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp 189–194
34.
Zurück zum Zitat Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A Math Phys Sci 426:233–271MathSciNetMATH Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A Math Phys Sci 426:233–271MathSciNetMATH
35.
Zurück zum Zitat Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO-99, vol 68. Springer, Berlin, Heidelberg, pp 388–397 Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO-99, vol 68. Springer, Berlin, Heidelberg, pp 388–397
36.
Zurück zum Zitat Messerges T, Dabbish E, Sloan R (2002) Examining smartcard security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef Messerges T, Dabbish E, Sloan R (2002) Examining smartcard security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552MathSciNetCrossRef
37.
Zurück zum Zitat Banerjee S, Odelu V, Das AK, Chattopadhyay S, Kumar N, Park Y, Tanwar S (2018) Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access 6:20673–20693CrossRef Banerjee S, Odelu V, Das AK, Chattopadhyay S, Kumar N, Park Y, Tanwar S (2018) Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access 6:20673–20693CrossRef
Metadaten
Titel
AUGChain: blockchain-based mobile user authentication scheme in global mobility network
verfasst von
Sudip Kumar Palit
Mohuya Chakraborty
Subhalaxmi Chakraborty
Publikationsdatum
27.10.2021
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 5/2022
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-04139-y

Weitere Artikel der Ausgabe 5/2022

The Journal of Supercomputing 5/2022 Zur Ausgabe

Premium Partner