A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

被引:10
作者
Baig, Ahmed Fraz [1 ]
ul Hassan, Khwaja Mansoor [1 ]
Ghani, Anwar [1 ]
Chaudhry, Shehzad Ashraf [1 ]
Khan, Imran [1 ]
Ashraf, Muhammad Usman [1 ,2 ]
机构
[1] Int Islamic Univ, Dept Comp Sci Software Engn, Islamabad, Pakistan
[2] Agr Univ Faisalabad, IBMS, Faisalabad, Pakistan
来源
PLOS ONE | 2018年 / 13卷 / 04期
关键词
ROAMING SERVICE; SCHEME; ARCHITECTURE;
D O I
10.1371/journal.pone.0196061
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
引用
收藏
页数:21
相关论文
共 33 条
  • [1] Survivable mobile phone network architectures: Models and solution methods
    Alevras, D
    Grotschel, M
    Jonas, P
    Paul, U
    Wessaly, R
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1998, 36 (03) : 88 - 93
  • [2] Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Leng, Lu
    Kumar, Neeraj
    [J]. COMPUTER NETWORKS, 2016, 101 : 42 - 62
  • [3] [Anonymous], INT J NETWORK SECURI
  • [4] Network layer mobility: An architecture and survey
    Bhagwat, P
    Perkins, C
    Tripathi, S
    [J]. IEEE PERSONAL COMMUNICATIONS, 1996, 3 (03): : 54 - 64
  • [5] A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Islam, S. K. Hafizul
    Shon, Taeshik
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) : 311 - 335
  • [6] Das A. K., 2013, "Netw.Sci., V2, P12
  • [7] Dressler F, 2008, IJ NETWORK SECURITY, V7, P882
  • [8] A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
    Farash, Mohammad Sabzinejad
    Chaudhry, Shehzad Ashraf
    Heydari, Mohammad
    Sadough, S. Mohammad Sajad
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (04)
  • [9] Go J, 2001, CITESEER
  • [10] Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks
    Gope, Prosanta
    Hwang, Tzonelih
    [J]. IEEE SYSTEMS JOURNAL, 2016, 10 (04): : 1370 - 1379