IMPROVED EFFICIENT AUTHENTICATION SCHEME WITH ANONYMITY IN GLOBAL MOBILITY NETWORKS

被引:0
作者
Chen, Chi-Tung [1 ]
机构
[1] Natl Chin Yi Univ Technol, Dept Distribut Management, 57,Sec 2,Zhongshan Rd, Taichung 41170, Taiwan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2013年 / 9卷 / 08期
关键词
Authentication; Anonymity; Global mobility networks; Efficiency; BAN logic;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A number of user authentication schemes have been proposed to provide roaming services in the global mobility network (GLOMONET). However, most of these schemes are based on an asymmetric cryptosystem, which has a higher computational cost. To achieve computational efficiency, Chang et al. proposed an authentication scheme using simple hash functions for mobile devices in the GLOMONET. However, this study shows that the scheme by Chang et al. does not provide user anonymity and cannot counteract insider attacks, in addition to being vulnerable to the disclosure of session keys and foreign agent spoofing. Therefore, this study proposes a more secure and efficient authentication scheme and uses the Burrows-Abadi-Needham (BAN) logic method to verify the scheme. The proposed scheme can overcome the main disadvantages of the Chang et al. scheme and satisfy the crucial design criteria for a secure remote user authentication scheme. The proposed scheme can provide a more secure functionality and has superior performance, such as a lower computational cost, less time complexity, fewer communication rounds, fewer transmitted messages, and less energy consumption. For practical purposes, this study demonstrates that the proposed scheme can be used to enhance the effectiveness and efficiency of the authentication scheme in the GLOMONET.
引用
收藏
页码:3319 / 3339
页数:21
相关论文
共 29 条
[1]   Performance analysis of cryptographic protocols on handheld devices [J].
Argyroudis, PG ;
Verma, R ;
Tewari, H ;
O'Mahony, D .
THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, :169-174
[2]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[3]  
Chang CC, 2011, INT J INNOV COMPUT I, V7, P4589
[4]   Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin ;
Chi, Yen-Chang .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :611-618
[5]  
Chang YF, 2004, IEICE T COMMUN, VE87B, P3088
[6]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[7]  
He D., 2010, 13 INT C NETW BAS IN
[8]   A strong user authentication scheme with smart cards for wireless communications [J].
He, Daojing ;
Ma, Maode ;
Zhang, Yan ;
Chen, Chun ;
Bu, Jiajun .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :367-374
[9]  
Hossain M., 2011, INT J ENG, V5, P292
[10]   Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment [J].
Hsiang, Han-Cheng ;
Shih, Wei-Kuan .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) :1118-1123