A Secure User Authentication Protocol for Heterogeneous Mobile Environments

被引:0
|
作者
Hassan, Alzubair [1 ,2 ]
Hamza, Rafik [3 ]
Li, Fagen [4 ]
Ali, Awad [5 ]
Bashir, Mohammed Bakri [6 ,7 ]
Alqhtani, Samar M. [8 ]
Tawfeeg, Tawfeeg Mohmmed [9 ]
Yousif, Adil [5 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Dept Comp Sci, Dublin D04 V1W8, Ireland
[2] Univ Limerick, Lero Irish Software Res Ctr, Limerick V94 NYD3, Ireland
[3] Tokyo Int Univ, Inst Int Strategy, Saitama 3501197, Japan
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[5] Najran Univ, Coll Sci & Arts Sharourah, Dept Comp Sci, Sharourah 68341, Saudi Arabia
[6] Taif Univ, Turubah Univ Coll, Dept Math, Taif 26571, Saudi Arabia
[7] Shendi Univ, Fac Comp Sci & Informat Technol, Dept Comp Sci, Shendi 41601, Sudan
[8] Najran Univ, Coll Comp Sci & Informat Syst, Dept Informat Syst, Najran 61441, Saudi Arabia
[9] Univ Sci & Technol, Fac Comp Sci & Informat Technol, Dept Comp Sci, Khartoum 14411, Sudan
关键词
User authentication; key agreement; random oracle model; heterogeneous environment; KEY EXCHANGE PROTOCOL; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; EFFICIENT; SIGNATURES; SCHEME;
D O I
10.1109/ACCESS.2022.3186683
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications. However, existing user authentication protocols are only suitable if the client and the server use a similar cryptographic approach. Therefore, it is important to develop an authentication protocol for mobile environments with heterogeneous cryptographic approaches. In this paper, an efficient user authentication and key agreement protocol is proposed for a heterogeneous client-server mobile environment. The security of the proposed scheme is formally proved under the q-strong Diffie-Hellman problem (q-SDH), the q-bilinear Diffe-Hellman inversion problem (q-BDHI), and the modified bilinear Diffie-Hellman inversion problem (mBDHI), respectively. Our scheme has reasonable processing costs and communication costs on the client and server sides. Moreover, our scheme is suitable for applications that use different cryptographic approaches. In particular, the proposed protocol can work when the client applies the identity-based cryptosystem and the server applies the certificateless cryptosystem.
引用
收藏
页码:69757 / 69770
页数:14
相关论文
共 50 条
  • [11] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [12] ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement
    Cherbal, Sarra
    Benchetioui, Rania
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109
  • [13] A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
    Amin, Ruhul
    Biswas, G. P.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [14] A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks
    Bruce, Ndibanje
    Lee, Hoon Jae
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 52 - 59
  • [15] An efficient user authentication and key exchange protocol for mobile client-server environment
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    COMPUTER NETWORKS, 2010, 54 (09) : 1520 - 1530
  • [16] Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function
    Saleem, Muhammad Asad
    Ghaffar, Zahid
    Mahmood, Khalid
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    Khan, Muhammad Khurram
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (22) : 16613 - 16622
  • [17] An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
    Pan, Tian-Yang
    Chen, Li-Quan
    Zhang, Yuan-Fang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 632 - 635
  • [18] A Secure User Authentication Scheme with Biometrics for IoT Medical Environments
    Park, YoHan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 607 - 615
  • [19] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [20] Secure IoU in Adversarial Environments: User Authentication and Performance Optimization
    Wu, Weiwei
    Lin, Di
    Hu, Su
    Yang, Gang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (09) : 12154 - 12166