An anonymity-preserving mobile user authentication protocol for global roaming services

被引:6
作者
Roy, Prasanta Kumar [1 ]
Bhattacharya, Ansuman [1 ]
机构
[1] Indian Sch Mines, Indian Inst Technol, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Mutual authentication; Anonymity; Security; Elliptic curve factorization problem; Global roaming services; KEY EXCHANGE; SECURITY; SCHEME;
D O I
10.1016/j.comnet.2022.109532
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we put forward an anonymity-preserving mobile user authentication protocol for global roaming services. It deals with Mutual Authentication and Key Agreement (MAKA) between Mobile User (MU) and Foreign Agent (FA). It replaces the traditional Elliptic Curve Computational Diffie-Hellman Problem (ECCDHP) by Elliptic Curve Factorization Problem (ECFP) to reduce the computational overhead of the authentication system while keeping the system security unaltered. It can preserve user anonymity and conditional privacy using session-wise unique anonymous identities of MU, where each anonymous identity hides the real identity in such a way so that only Home Agent (HA) can recompute it. Besides, our protocol also concentrates on the anonymity and conditional privacy of FA. It also provides a simplified revocation strategy which minimizes the revocation and re-registration costs of the authentication system. We validate the security features through informal and formal security analysis. Finally, we present a performance comparison, and discuss the efficiency of the proposed protocol.
引用
收藏
页数:11
相关论文
共 40 条
  • [21] Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks
    Lu, Yanrong
    Xu, Guangquan
    Li, Lixiang
    Yang, Yixian
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (02): : 1454 - 1465
  • [22] Robust and Efficient Authentication Scheme for Session Initiation Protocol
    Lu, Yanrong
    Li, Lixiang
    Yang, Yixian
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [23] Menezes A.J., 2018, Handbook of Applied Cryptography, DOI DOI 10.1201/9780429466335
  • [24] An Efficient Certificateless Authenticated Key Exchange Protocol Resistant to Ephemeral Key Leakage Attack for V2V Communication in IoV
    Meng, Lei
    Xu, Haitao
    Xiong, Hu
    Zhang, Xuewang
    Zhou, Xianwei
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) : 11736 - 11747
  • [25] Examining smart-card security under the threat of power analysis attacks
    Messerges, TS
    Dabbish, EA
    Sloan, RH
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) : 541 - 552
  • [26] A provably secure ECC-based roaming authentication scheme for global mobility networks
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    Kumari, Saru
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54 (54)
  • [27] Security in wireless communication
    Rahman, MG
    Imai, H
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 213 - 228
  • [28] AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
    Rahmani, Amir Masoud
    Mohammadi, Mokhtar
    Lansky, Jan
    Mildeova, Stanislava
    Safkhani, Masoumeh
    Kumari, Saru
    Karim, Sarkhel H. Taher
    Hosseinzadeh, Mehdi
    [J]. IEEE ACCESS, 2021, 9 : 88256 - 88271
  • [29] Rogaway P, 2004, LECT NOTES COMPUT SC, V3017, P371
  • [30] SMASG: Secure Mobile Authentication Scheme for Global Mobility Network
    Ryu, Jihyeon
    Lee, Hakjun
    Lee, Youngsook
    Won, Dongho
    [J]. IEEE ACCESS, 2022, 10 : 26907 - 26919