Secure and Efficient Anonymous Authentication Protocol for Global Roaming Services

被引:0
作者
Roy, Prasanta Kumar [1 ]
Bhattacharya, Ansuman [1 ]
机构
[1] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad, Bihar, India
来源
2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS) | 2019年
关键词
User anonymity; Mutual authentication; Session key agreement; Roaming service; Elliptic curve cryptography; SCHEME;
D O I
10.1109/comsnets.2019.8711474
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An important contribution of ubiquitous GLobal MObility NETwork (GLOMONET) is to provide global roaming services. However, the underlying strategy shows several challenges to be achieved such as user anonymity, authenticity, security and low computation cost. Several approaches have been proposed in recent research to address these issues. Unfortunately, some of them still failed to achieve desired security and design features. This article presents a secure and efficient anonymous authentication protocol for global roaming services based on Elliptic Curve Cryptography (ECC). The protocol is formally verified using widely accepted AVISPA tool which ensures its ability to resist various security attacks. Additionally, the informal security analysis of the protocol is carried out based on individual features. The performance analysis section at the end of this article shows that the proposed protocol achieves low computation cost as compared to several recently proposed protocols and thus, making it more suitable for lightweight practical applications of roaming services over GLOMONET.
引用
收藏
页码:44 / 49
页数:6
相关论文
共 22 条
  • [1] [Anonymous], 2016, IEEE T DEPENDABLE SE
  • [2] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [3] Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Park, Youngho
    Tanwar, Sudeep
    [J]. IEEE ACCESS, 2018, 6 : 20673 - 20693
  • [4] Basin D., 2005, Int. J. Inf. Secur., V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
  • [5] Boyd Colin., 2013, PROTOCOLS AUTHENTICA
  • [6] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [7] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
  • [8] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [9] The advantages of elliptic curve cryptography for wireless security
    Lauter, K
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67
  • [10] An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city
    Li, Xiong
    Sangaiah, Arun Kumar
    Kumari, Saru
    Wu, Fan
    Shen, Jian
    Khan, Muhammad Khurram
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 791 - 805