A Secure User Authentication Protocol for Heterogeneous Mobile Environments

被引:0
|
作者
Hassan, Alzubair [1 ,2 ]
Hamza, Rafik [3 ]
Li, Fagen [4 ]
Ali, Awad [5 ]
Bashir, Mohammed Bakri [6 ,7 ]
Alqhtani, Samar M. [8 ]
Tawfeeg, Tawfeeg Mohmmed [9 ]
Yousif, Adil [5 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Dept Comp Sci, Dublin D04 V1W8, Ireland
[2] Univ Limerick, Lero Irish Software Res Ctr, Limerick V94 NYD3, Ireland
[3] Tokyo Int Univ, Inst Int Strategy, Saitama 3501197, Japan
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[5] Najran Univ, Coll Sci & Arts Sharourah, Dept Comp Sci, Sharourah 68341, Saudi Arabia
[6] Taif Univ, Turubah Univ Coll, Dept Math, Taif 26571, Saudi Arabia
[7] Shendi Univ, Fac Comp Sci & Informat Technol, Dept Comp Sci, Shendi 41601, Sudan
[8] Najran Univ, Coll Comp Sci & Informat Syst, Dept Informat Syst, Najran 61441, Saudi Arabia
[9] Univ Sci & Technol, Fac Comp Sci & Informat Technol, Dept Comp Sci, Khartoum 14411, Sudan
关键词
User authentication; key agreement; random oracle model; heterogeneous environment; KEY EXCHANGE PROTOCOL; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; EFFICIENT; SIGNATURES; SCHEME;
D O I
10.1109/ACCESS.2022.3186683
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications. However, existing user authentication protocols are only suitable if the client and the server use a similar cryptographic approach. Therefore, it is important to develop an authentication protocol for mobile environments with heterogeneous cryptographic approaches. In this paper, an efficient user authentication and key agreement protocol is proposed for a heterogeneous client-server mobile environment. The security of the proposed scheme is formally proved under the q-strong Diffie-Hellman problem (q-SDH), the q-bilinear Diffe-Hellman inversion problem (q-BDHI), and the modified bilinear Diffie-Hellman inversion problem (mBDHI), respectively. Our scheme has reasonable processing costs and communication costs on the client and server sides. Moreover, our scheme is suitable for applications that use different cryptographic approaches. In particular, the proposed protocol can work when the client applies the identity-based cryptosystem and the server applies the certificateless cryptosystem.
引用
收藏
页码:69757 / 69770
页数:14
相关论文
共 50 条
  • [21] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    Madhusudhan, R.
    Shashidhara, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 82 - 103
  • [22] A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
    Farash, Mohammad Sabzinejad
    Nawaz, Omer
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Khurram
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (07)
  • [23] A secure and efficient user authentication protocol for wireless sensor network
    Kumar, Devender
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) : 27131 - 27154
  • [24] A secure and efficient user authentication protocol for wireless sensor network
    Devender Kumar
    Multimedia Tools and Applications, 2021, 80 : 27131 - 27154
  • [25] A secure user authentication protocol for sensor network in data capturing
    Zhou Quan
    Tang Chunming
    Zhen Xianghan
    Rong Chunming
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2015, 4
  • [26] A hybrid user authentication protocol for mobile IPTV service
    Kim, Soo-Cheol
    Yeo, Sang-Soo
    Kim, Sung Kwon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (02) : 283 - 296
  • [27] A Secure Three-Factor Authentication Protocol for E-Governance System Based on Multiserver Environments
    Cho, Yeongjae
    Oh, Jihyeon
    Kwon, Deokkyu
    Son, Seunghwan
    Yu, Sungjin
    Park, Yohan
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 74351 - 74365
  • [28] A hybrid user authentication protocol for mobile IPTV service
    Soo-Cheol Kim
    Sang-Soo Yeo
    Sung Kwon Kim
    Multimedia Tools and Applications, 2013, 65 : 283 - 296
  • [29] A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
    Wang, Chenyu
    Xu, Guoai
    Li, Wenting
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [30] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815