A Secure User Authentication Protocol for Heterogeneous Mobile Environments

被引:0
|
作者
Hassan, Alzubair [1 ,2 ]
Hamza, Rafik [3 ]
Li, Fagen [4 ]
Ali, Awad [5 ]
Bashir, Mohammed Bakri [6 ,7 ]
Alqhtani, Samar M. [8 ]
Tawfeeg, Tawfeeg Mohmmed [9 ]
Yousif, Adil [5 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Dept Comp Sci, Dublin D04 V1W8, Ireland
[2] Univ Limerick, Lero Irish Software Res Ctr, Limerick V94 NYD3, Ireland
[3] Tokyo Int Univ, Inst Int Strategy, Saitama 3501197, Japan
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[5] Najran Univ, Coll Sci & Arts Sharourah, Dept Comp Sci, Sharourah 68341, Saudi Arabia
[6] Taif Univ, Turubah Univ Coll, Dept Math, Taif 26571, Saudi Arabia
[7] Shendi Univ, Fac Comp Sci & Informat Technol, Dept Comp Sci, Shendi 41601, Sudan
[8] Najran Univ, Coll Comp Sci & Informat Syst, Dept Informat Syst, Najran 61441, Saudi Arabia
[9] Univ Sci & Technol, Fac Comp Sci & Informat Technol, Dept Comp Sci, Khartoum 14411, Sudan
关键词
User authentication; key agreement; random oracle model; heterogeneous environment; KEY EXCHANGE PROTOCOL; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; EFFICIENT; SIGNATURES; SCHEME;
D O I
10.1109/ACCESS.2022.3186683
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications. However, existing user authentication protocols are only suitable if the client and the server use a similar cryptographic approach. Therefore, it is important to develop an authentication protocol for mobile environments with heterogeneous cryptographic approaches. In this paper, an efficient user authentication and key agreement protocol is proposed for a heterogeneous client-server mobile environment. The security of the proposed scheme is formally proved under the q-strong Diffie-Hellman problem (q-SDH), the q-bilinear Diffe-Hellman inversion problem (q-BDHI), and the modified bilinear Diffie-Hellman inversion problem (mBDHI), respectively. Our scheme has reasonable processing costs and communication costs on the client and server sides. Moreover, our scheme is suitable for applications that use different cryptographic approaches. In particular, the proposed protocol can work when the client applies the identity-based cryptosystem and the server applies the certificateless cryptosystem.
引用
收藏
页码:69757 / 69770
页数:14
相关论文
共 50 条
  • [1] A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
    Son, Seunghwan
    Park, Yohan
    Park, Youngho
    SUSTAINABILITY, 2021, 13 (16)
  • [2] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [3] Toward Designing a Secure Authentication Protocol for IoT Environments
    Hosseinzadeh, Mehdi
    Malik, Mazhar Hussain
    Safkhani, Masoumeh
    Bagheri, Nasour
    Le, Quynh Hoang
    Tightiz, Lilia
    Mosavi, Amir H.
    SUSTAINABILITY, 2023, 15 (07)
  • [4] A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEEE ACCESS, 2016, 4 : 4394 - 4407
  • [5] A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment
    Hassan, Alzubair
    Eltayieb, Nabeil
    Elhabob, Rashad
    Li, Fagen
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 592 - 602
  • [6] ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networks
    Parne, Balu L.
    Gupta, Shubham
    Chaudhari, Narendra S.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (06):
  • [7] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [8] Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    Hu, Bin
    Wong, Duncan S.
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 124 - 129
  • [9] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330
  • [10] Robust and secure authentication protocol protecting privacy for roaming mobile user in global mobility networks
    Madhusudhan, R.
    Suvidha, K. S.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (01) : 94 - 111