A Secure User Authentication Protocol for Heterogeneous Mobile Environments

被引:0
|
作者
Hassan, Alzubair [1 ,2 ]
Hamza, Rafik [3 ]
Li, Fagen [4 ]
Ali, Awad [5 ]
Bashir, Mohammed Bakri [6 ,7 ]
Alqhtani, Samar M. [8 ]
Tawfeeg, Tawfeeg Mohmmed [9 ]
Yousif, Adil [5 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Dept Comp Sci, Dublin D04 V1W8, Ireland
[2] Univ Limerick, Lero Irish Software Res Ctr, Limerick V94 NYD3, Ireland
[3] Tokyo Int Univ, Inst Int Strategy, Saitama 3501197, Japan
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[5] Najran Univ, Coll Sci & Arts Sharourah, Dept Comp Sci, Sharourah 68341, Saudi Arabia
[6] Taif Univ, Turubah Univ Coll, Dept Math, Taif 26571, Saudi Arabia
[7] Shendi Univ, Fac Comp Sci & Informat Technol, Dept Comp Sci, Shendi 41601, Sudan
[8] Najran Univ, Coll Comp Sci & Informat Syst, Dept Informat Syst, Najran 61441, Saudi Arabia
[9] Univ Sci & Technol, Fac Comp Sci & Informat Technol, Dept Comp Sci, Khartoum 14411, Sudan
关键词
User authentication; key agreement; random oracle model; heterogeneous environment; KEY EXCHANGE PROTOCOL; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; EFFICIENT; SIGNATURES; SCHEME;
D O I
10.1109/ACCESS.2022.3186683
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications. However, existing user authentication protocols are only suitable if the client and the server use a similar cryptographic approach. Therefore, it is important to develop an authentication protocol for mobile environments with heterogeneous cryptographic approaches. In this paper, an efficient user authentication and key agreement protocol is proposed for a heterogeneous client-server mobile environment. The security of the proposed scheme is formally proved under the q-strong Diffie-Hellman problem (q-SDH), the q-bilinear Diffe-Hellman inversion problem (q-BDHI), and the modified bilinear Diffie-Hellman inversion problem (mBDHI), respectively. Our scheme has reasonable processing costs and communication costs on the client and server sides. Moreover, our scheme is suitable for applications that use different cryptographic approaches. In particular, the proposed protocol can work when the client applies the identity-based cryptosystem and the server applies the certificateless cryptosystem.
引用
收藏
页码:69757 / 69770
页数:14
相关论文
共 50 条
  • [41] Biometric based User Authentication Protocol for Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasalu
    2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [42] Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (17) : 2442 - 2456
  • [43] A Secure Authentication Protocol for Internet of Vehicles
    Chen, Chien-Ming
    Xiang, Bin
    Liu, Yining
    Wang, King-Hang
    IEEE ACCESS, 2019, 7 : 12047 - 12057
  • [44] Cryptanalysis of a Chaotic Maps-based User Authentication and Key Agreement Protocol for Multi-server Environments
    Zhang, Jiao
    He, Yong
    Liu, Yu-zhen
    Li, Xiong
    INTERNATIONAL CONFERENCE ON ADVANCES IN MANAGEMENT SCIENCE AND ENGINEERING (AMSE 2015), 2015, : 155 - 159
  • [45] Improvement of user authentication protocol with anonymity for wireless communications
    Hu, Bin
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    KUWAIT JOURNAL OF SCIENCE, 2014, 41 (01) : 155 - 169
  • [46] Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices
    Suresh, Devanapalli
    Odelu, Vanga
    Reddy, Alavalapati Goutham
    Phaneendra, Kolloju
    Kim, Hyun Sung
    IEEE ACCESS, 2022, 10 : 109526 - 109536
  • [47] The Authentication Game - Secure User Authentication by Gamification?
    Ebbers, Frank
    Brune, Philipp
    ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2016), 2016, 9694 : 101 - 115
  • [48] Provable Secure Anonymous Device Authentication Protocol in IoT Environment
    Ren, Shanyao
    Liu, Yizhong
    Yu, Beiyuan
    Liu, Jianwei
    Li, Dongyu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12266 - 12277
  • [49] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [50] Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments
    Pang, Fengling
    Hsu, Chingfang
    Au, Man Ho
    Harn, Lein
    Zhang, Ze
    Long, Li
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 849 - 856