A secure lightweight two-factor authentication scheme in global mobility networks

被引:0
作者
Madhusudhan, R. [1 ]
Suvidha, K. S. [1 ]
机构
[1] Natl Inst Technol Karnataka, Dept Math & Computat Sci, Srinivasnagar PO, Mangalore, India
关键词
user anonymous; authentication; smart-card; security; AVISPA; BAN logic; global mobility networks; GLOMONETs; ROAMING SERVICE; USER AUTHENTICATION; ANONYMITY; MECHANISM; PROTOCOL; ROBUST;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2016, Gope and Hwang have proposed a scheme, in which they stated that their scheme preserves user anonymity. However with the thorough cryptanalysis of their scheme, we have proved that their scheme is vulnerable to various security attacks. To overcome the security attacks and to achieve the security goals, a new scheme has been proposed. Through the rigorous informal and formal security analysis, we have demonstrated that the proposed scheme is secure against the security attacks. Further, the proposed scheme is simulated using widely accepted automated validation of internet security protocols and applications (AVISPA) tool. With the simulated results of the proposed scheme, we proved that the proposed scheme is secure against active and passive security attacks. Additionally, the proposed scheme is compared with Gope and Hwang and other schemes in terms of performance, computational cost and communication overhead. The proposed scheme is efficient and robust.
引用
收藏
页码:109 / 123
页数:15
相关论文
共 34 条
[1]  
[Anonymous], CASE REPORT MED, DOI DOI 10.1155/2013/641851
[2]  
[Anonymous], 2001, Technical Report
[3]  
Burrows M., 1988, Proceedings of the Second Conference on Theoretical Aspects of Reasoning about Knowledge, P325
[4]   Extensions to an authentication technique proposed for the global mobility network [J].
Buttyán, L ;
Gbaguidi, C ;
Staamann, S ;
Wilhelm, W .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2000, 48 (03) :373-376
[5]  
Chang CC, 2011, INT J INNOV COMPUT I, V7, P4589
[6]   Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin ;
Chi, Yen-Chang .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :611-618
[7]  
Chen CT, 2013, INT J INNOV COMPUT I, V9, P3319
[8]   Lightweight and provably secure user authentication with anonymity for the global mobility network [J].
Chen, Chun ;
He, Daojing ;
Chan, Sammy ;
Bu, Jiajun ;
Gao, Yi ;
Fan, Rong .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (03) :347-362
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]   An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 :1-8