Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets

被引:21
|
作者
Hwang, Tzonelih [1 ]
Gope, Prosanta [2 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
[2] Natl Cheng Kung Univ, Tainan 70101, Taiwan
关键词
Authentication; Key exchange; One-time-secret; Transaction sequence number; GSM; UMTS;
D O I
10.1007/s11277-013-1501-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the increasing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security as compared to GSM (2G) systems, UMTS still has some weaknesses that may often lead to several security incidents. In this article, we come up with a novel authentication mechanism based on the one-time-secret security capabilities, which can assure an expeditious mobile communication environment and simultaneously be able to deal with the several issues related to security vulnerabilities (Redirection Attack, Man-in-the-Middle-Attack) and others like the excessive bandwidth consumption, storage overhead in VLR etc. existing in the current mobile communication (UMTS). In addition, here we also introduce a new concept called "Neighborhood Policy", where several VLRs can form groups among themselves and carry out significant responsibilities in order to authenticate a User without interfering HLRs even though the User moves to a new VLR (belongs to the same group). We argue that the proposed solution not only achieves the mutual authentication in a secure manner, but at the same time, it also greatly reduces the computation and communication cost of the mobile User as compared to the existing state of the art authentication schemes.
引用
收藏
页码:197 / 224
页数:28
相关论文
共 22 条
  • [1] Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets
    Tzonelih Hwang
    Prosanta Gope
    Wireless Personal Communications, 2014, 77 : 197 - 224
  • [2] A secure and efficient one-time password authentication scheme for WSN
    Ling C.-H.
    Lee C.-C.
    Yang C.-C.
    Hwang M.-S.
    Hwang, Min-Shiang (mshwang@ asia. edu.tw), 1600, Femto Technique Co., Ltd. (19): : 177 - 181
  • [3] Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Yang, Lei
    Luo, Jia-Ning
    Tso, Raylin
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (07) : 6992 - 7020
  • [4] Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
    Tsu-Yang Wu
    Zhiyuan Lee
    Lei Yang
    Jia-Ning Luo
    Raylin Tso
    The Journal of Supercomputing, 2021, 77 : 6992 - 7020
  • [5] A secure one-time password authentication scheme using smart cards
    Yeh, TC
    Shen, HY
    Hwang, JJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (11) : 2515 - 2518
  • [6] Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
    Ju, Sieun
    Park, Yohan
    SENSORS, 2023, 23 (24)
  • [7] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [8] A Visual One-Time Password Authentication Scheme Using Mobile Devices
    Chow, Yang-Wai
    Susilo, Willy
    Au, Man Ho
    Barmawi, Ari Moesriami
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 243 - 257
  • [9] A Secure One-Time Password Authentication Scheme Using Image Texture Features
    Maity, Maitreya
    Dhane, Dhiraj Manohar
    Mungle, Tushar
    Chakraborty, Rupak
    Deokamble, Vasant
    Chakraborty, Chandan
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 283 - 294
  • [10] Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
    Xie, Qi
    SCIENTIA IRANICA, 2012, 19 (06) : 1856 - 1860