Skip to main content
Erschienen in: Wireless Personal Communications 2/2014

01.07.2014

An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks

verfasst von: Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang

Erschienen in: Wireless Personal Communications | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The concept of anonymous channel ticket is one of the effective measures to protect user privacy and to reduce the overhead of re-authentication for wireless environments. Most recently, Hsieh et al. proposed an anonymous authentication protocol based on elliptic curve cryptography to enhance the efficiency and security strength. However, we identify that Hsieh et al.’s scheme has four weaknesses. (1) The scheme fails to provide identity anonymity. (2) The ticket authentication phase of the scheme suffers from desynchronization attack. (3) The scheme is vulnerable to the privileged insider attack. (4) Users cannot change passwords when required. We further propose an improved authentication scheme, which not only preserves the merits of the scheme of Hsieh et al., but also enjoys several other advantages. Our improved scheme is effective in protection from the weaknesses identified and achieves user anonymity and unlinkability. We compare the functionality and performance of our improved scheme with other related schemes, which indicates that our scheme is more secure and yet efficient for wireless access networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Samfat, D., Molva, R., & Asokan, N. (1995). Untraceability in mobile networks. In ACM Mobicom’95 (pp. 26–36). Samfat, D., Molva, R., & Asokan, N. (1995). Untraceability in mobile networks. In ACM Mobicom’95 (pp. 26–36).
2.
Zurück zum Zitat Boyd, C., & Mathuria, A. (2000). Key establishment protocols for secure mobile communications: A critical survey. Computer Communications, 23(5–6), 575–587.CrossRef Boyd, C., & Mathuria, A. (2000). Key establishment protocols for secure mobile communications: A critical survey. Computer Communications, 23(5–6), 575–587.CrossRef
3.
Zurück zum Zitat Jiang, Y. X., Lin, C., & Shen, X. M. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 5(9), 2569–2577.CrossRef Jiang, Y. X., Lin, C., & Shen, X. M. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 5(9), 2569–2577.CrossRef
4.
Zurück zum Zitat Yang, G. M., Wong, D. S., & Deng, X. T. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 1035–1042. Yang, G. M., Wong, D. S., & Deng, X. T. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 1035–1042.
5.
Zurück zum Zitat Debiao, H., Jianhua, C., & Jin, H. (2012). An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion, 13(3), 223–230.CrossRef Debiao, H., Jianhua, C., & Jin, H. (2012). An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion, 13(3), 223–230.CrossRef
6.
Zurück zum Zitat Debiao, H. (2012). An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.CrossRef Debiao, H. (2012). An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.CrossRef
7.
Zurück zum Zitat Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transaction on Consumer Electronics, 50(1), 230–234.MathSciNet Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transaction on Consumer Electronics, 50(1), 230–234.MathSciNet
8.
Zurück zum Zitat Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transaction on Industrial Electronics, 53(5), 1683–1687.CrossRef Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transaction on Industrial Electronics, 53(5), 1683–1687.CrossRef
9.
Zurück zum Zitat Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.CrossRef Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.CrossRef
10.
Zurück zum Zitat Zeng, P., Cao, Z. F., Choo, K.-K. R., & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters, 13(3), 170–171.CrossRef Zeng, P., Cao, Z. F., Choo, K.-K. R., & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters, 13(3), 170–171.CrossRef
11.
Zurück zum Zitat Lee, J. S., Chang, J. H., & Lee, D. H. (2009). Security flaw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 13(5), 292–293.CrossRef Lee, J. S., Chang, J. H., & Lee, D. H. (2009). Security flaw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 13(5), 292–293.CrossRef
12.
Zurück zum Zitat Chen, C.-L., Lee, C.-C., & Hsu, C.-Y. (2012). Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems, 25(5), 585–597.CrossRef Chen, C.-L., Lee, C.-C., & Hsu, C.-Y. (2012). Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems, 25(5), 585–597.CrossRef
13.
Zurück zum Zitat Ma, C.-G., Wang, D., & Zhao, S.-D. (2012). Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems. doi:10.1002/dac.2468. Ma, C.-G., Wang, D., & Zhao, S.-D. (2012). Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems. doi:10.​1002/​dac.​2468.
14.
Zurück zum Zitat He, D. J., Ma, M. D., Zhang, Y., & Chen, C. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef He, D. J., Ma, M. D., Zhang, Y., & Chen, C. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef
15.
Zurück zum Zitat Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611–618.CrossRef Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611–618.CrossRef
16.
Zurück zum Zitat Youn, T. Y., Park, Y. H., & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters, 13(7), 471–473.CrossRef Youn, T. Y., Park, Y. H., & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters, 13(7), 471–473.CrossRef
17.
Zurück zum Zitat He, D., Chan, S., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.CrossRef He, D., Chan, S., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.CrossRef
18.
Zurück zum Zitat Yoon, E.-J., Yoo, K.-Y., & Ha, K.-S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering, 37(3), 356–364.CrossRef Yoon, E.-J., Yoo, K.-Y., & Ha, K.-S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering, 37(3), 356–364.CrossRef
19.
Zurück zum Zitat Chen, C., He, D., Chan, S., et al. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24(3), 347–362.CrossRef Chen, C., He, D., Chan, S., et al. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24(3), 347–362.CrossRef
20.
Zurück zum Zitat Xu, J., Zhu, W. T., & Feng, D. G. (2011). An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34(3), 319–325.CrossRef Xu, J., Zhu, W. T., & Feng, D. G. (2011). An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34(3), 319–325.CrossRef
21.
Zurück zum Zitat Zhou, T., & Xu, J. (2011). Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Computer Networks, 55(1), 205–213.CrossRefMATH Zhou, T., & Xu, J. (2011). Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Computer Networks, 55(1), 205–213.CrossRefMATH
22.
Zurück zum Zitat Li, C.-T., & Lee, C.-C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNet Li, C.-T., & Lee, C.-C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNet
23.
Zurück zum Zitat Niu, J., & Li, X. (2012). A novel user authentication scheme with anonymity for wireless communications. Security and Communication Networks. doi:10.1002/sec.601. Niu, J., & Li, X. (2012). A novel user authentication scheme with anonymity for wireless communications. Security and Communication Networks. doi:10.​1002/​sec.​601.
24.
Zurück zum Zitat Wu, S., Zhu, Y., & Pu, Q. (2011). A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks. International Journal of Network Management. doi:10.1002/nem.764. Wu, S., Zhu, Y., & Pu, Q. (2011). A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks. International Journal of Network Management. doi:10.​1002/​nem.​764.
25.
Zurück zum Zitat Jiang, Q., Ma, J., Li, G., & Yang, L. (2012). An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications. doi:10.1007/s11277-012-0535-4. Jiang, Q., Ma, J., Li, G., & Yang, L. (2012). An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications. doi:10.​1007/​s11277-012-0535-4.
26.
Zurück zum Zitat Lin, W. D., & Jan, J. (2001). A wireless-based authentication and anonymous channels for large scale area. In Proceedings of the IEEE symposium on computers and communications (pp. 36–41). Hammamet, Tunisia. Lin, W. D., & Jan, J. (2001). A wireless-based authentication and anonymous channels for large scale area. In Proceedings of the IEEE symposium on computers and communications (pp. 36–41). Hammamet, Tunisia.
27.
Zurück zum Zitat Barbancho, A. M., & Peinado, A. (2003). Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Computer Networks, 43, 777–785.CrossRefMATH Barbancho, A. M., & Peinado, A. (2003). Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Computer Networks, 43, 777–785.CrossRefMATH
28.
Zurück zum Zitat Yang, C. C., Tang, Y. L., Wang, R. C., & Yang, H. W. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431–1439.CrossRefMATHMathSciNet Yang, C. C., Tang, Y. L., Wang, R. C., & Yang, H. W. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431–1439.CrossRefMATHMathSciNet
29.
Zurück zum Zitat Chen, Y. C., Chuang, S. C., Yeh, L. Y., & Huang, J. L. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366–1375.CrossRef Chen, Y. C., Chuang, S. C., Yeh, L. Y., & Huang, J. L. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366–1375.CrossRef
30.
Zurück zum Zitat Lee, C. C., Lin, T. H., & Tsai, C. S. (2012). Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. Security and Communication Networks. doi:10.1002/sec.430. Lee, C. C., Lin, T. H., & Tsai, C. S. (2012). Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. Security and Communication Networks. doi:10.​1002/​sec.​430.
31.
Zurück zum Zitat Hsieh, W.-B., & Leu, J.-S. (2012). Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wireless Communications and Mobile Computing. doi:10.1002/wcm.2252. Hsieh, W.-B., & Leu, J.-S. (2012). Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wireless Communications and Mobile Computing. doi:10.​1002/​wcm.​2252.
33.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transaction on Computer System, 8(1), 18–36.CrossRef Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transaction on Computer System, 8(1), 18–36.CrossRef
Metadaten
Titel
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks
verfasst von
Qi Jiang
Jianfeng Ma
Guangsong Li
Li Yang
Publikationsdatum
01.07.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1594-x

Weitere Artikel der Ausgabe 2/2014

Wireless Personal Communications 2/2014 Zur Ausgabe

Neuer Inhalt