A Secure User Authentication Protocol for Heterogeneous Mobile Environments

被引:0
|
作者
Hassan, Alzubair [1 ,2 ]
Hamza, Rafik [3 ]
Li, Fagen [4 ]
Ali, Awad [5 ]
Bashir, Mohammed Bakri [6 ,7 ]
Alqhtani, Samar M. [8 ]
Tawfeeg, Tawfeeg Mohmmed [9 ]
Yousif, Adil [5 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Dept Comp Sci, Dublin D04 V1W8, Ireland
[2] Univ Limerick, Lero Irish Software Res Ctr, Limerick V94 NYD3, Ireland
[3] Tokyo Int Univ, Inst Int Strategy, Saitama 3501197, Japan
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[5] Najran Univ, Coll Sci & Arts Sharourah, Dept Comp Sci, Sharourah 68341, Saudi Arabia
[6] Taif Univ, Turubah Univ Coll, Dept Math, Taif 26571, Saudi Arabia
[7] Shendi Univ, Fac Comp Sci & Informat Technol, Dept Comp Sci, Shendi 41601, Sudan
[8] Najran Univ, Coll Comp Sci & Informat Syst, Dept Informat Syst, Najran 61441, Saudi Arabia
[9] Univ Sci & Technol, Fac Comp Sci & Informat Technol, Dept Comp Sci, Khartoum 14411, Sudan
关键词
User authentication; key agreement; random oracle model; heterogeneous environment; KEY EXCHANGE PROTOCOL; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; EFFICIENT; SIGNATURES; SCHEME;
D O I
10.1109/ACCESS.2022.3186683
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications. However, existing user authentication protocols are only suitable if the client and the server use a similar cryptographic approach. Therefore, it is important to develop an authentication protocol for mobile environments with heterogeneous cryptographic approaches. In this paper, an efficient user authentication and key agreement protocol is proposed for a heterogeneous client-server mobile environment. The security of the proposed scheme is formally proved under the q-strong Diffie-Hellman problem (q-SDH), the q-bilinear Diffe-Hellman inversion problem (q-BDHI), and the modified bilinear Diffie-Hellman inversion problem (mBDHI), respectively. Our scheme has reasonable processing costs and communication costs on the client and server sides. Moreover, our scheme is suitable for applications that use different cryptographic approaches. In particular, the proposed protocol can work when the client applies the identity-based cryptosystem and the server applies the certificateless cryptosystem.
引用
收藏
页码:69757 / 69770
页数:14
相关论文
共 50 条
  • [31] Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,
  • [32] A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT
    Liu, Zhenhua
    Guo, Changbo
    Wang, Baocang
    IEEE ACCESS, 2020, 8 : 195914 - 195928
  • [33] Cryptanalysis of a User Authentication Protocol
    Tan, Zuowen
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 27 - 30
  • [34] An efficient and secure 3-factor user-authentication protocol for multiserver environment
    Luo, Min
    Sun, Aiying
    He, Debiao
    Li, Xiaohong
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (14)
  • [35] Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11) : 5927 - 5943
  • [36] A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
    Madhusudhan, R.
    Shashidhara, R.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2993 - 3014
  • [37] Anonymous and expeditious mobile user authentication scheme for GLOMONET environments
    Gope, Prosanta
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    Vijayakumar, Pandi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (02)
  • [38] Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments
    Xu, Zhiqiang
    He, Debiao
    Huang, Xinyi
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 595 - 605
  • [39] Secure and efficient authentication protocol with user untraceability for global roaming services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    WIRELESS NETWORKS, 2021, 27 (08) : 5189 - 5206
  • [40] A Secure Biometric Based User Authentication Protocol in Wireless Sensor Networks
    Yu, SungJin
    YoungLee, Joon
    Kim, MyeongHyun
    Park, YoungHo
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 830 - 834