A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks

被引:5
|
作者
Xu, Lili [1 ]
Wu, Fan [2 ]
机构
[1] Xiamen Univ, Sch Informat Sci & Technol, Xiamen 361005, Peoples R China
[2] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
关键词
authentication; three-factor authentication; user anonymity; formal proof; global mobility networks; USER AUTHENTICATION; ROAMING SERVICE; PROVABLY SECURE; PROTOCOL;
D O I
10.1002/sec.1551
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an important service, global roaming is widely used in global mobility networks to make the stable connectivity when the user goes through between different networks. To keep the security of communication, mutual authentication among the foreign agent, the home agent, and the user is a necessary part before normal data flow of the communication. Besides that, the need that the user's personal information should be protected is also an urgent task in the intercourse. Until now, a host of two-factor authentication schemes has been presented, and many weaknesses are presented under security analysis. Here, we propose a new three-factor key agreement and authentication scheme to overcome the problems, which exist in the past schemes. The security of the scheme is proved with three ways. The first is the formal proof employing the random oracle model. The second is the formal verification with Proverif, and the last is the informal analysis. And the presented scheme has all common security properties and is practical for applications. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:3428 / 3443
页数:16
相关论文
共 50 条
  • [1] A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Karuppiah, Marimuthu
    Baliyan, Renuka
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3527 - 3542
  • [2] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [3] Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1983 - 2001
  • [4] Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks
    Gope, Prosanta
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 160 - 167
  • [5] A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
    Ruhul Amin
    G. P. Biswas
    Journal of Medical Systems, 2015, 39
  • [6] A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
    Amin, Ruhul
    Biswas, G. P.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [7] An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks
    Chen, Ying
    Ge, Yangming
    Wang, Yerong
    Zeng, Zhuang
    IEEE ACCESS, 2019, 7 : 85440 - 85451
  • [8] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Huang, Wenfeng
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [9] A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
    Shin, Sooyeon
    Kwon, Taekyoung
    SENSORS, 2019, 19 (09)
  • [10] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Wenfeng Huang
    Scientific Reports, 14