AMAPG: Advanced Mobile Authentication Protocol for GLOMONET

被引:9
作者
Rahmani, Amir Masoud [1 ]
Mohammadi, Mokhtar [2 ]
Lansky, Jan [3 ]
Mildeova, Stanislava [3 ]
Safkhani, Masoumeh [4 ]
Kumari, Saru [5 ]
Karim, Sarkhel H. Taher [6 ]
Hosseinzadeh, Mehdi [7 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu 64002, Yunlin, Taiwan
[2] Lebanese French Univ, Coll Engn & Comp Sci, Dept Informat Technol, Erbil, Iraq
[3] Univ Finance & Adm, Fac Econ Studies, Dept Comp Sci & Math, Prague 10100, Czech Republic
[4] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran 1678815811, Iran
[5] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[6] Univ Halabja, Coll Sci, Comp Dept, Halabja, Iraq
[7] Gachon Univ, Pattern Recognit & Machine Learning Lab, Seongnam 13120, South Korea
关键词
Protocols; Authentication; Security; Smart cards; Roaming; Password; Privacy; Global mobility network; roaming; stolen smart card attack; traceability attack; impersonation attack; Scyther; BAN logic; KEY AGREEMENT SCHEME; ROAMING SERVICE; SECURE AUTHENTICATION; USER ANONYMITY;
D O I
10.1109/ACCESS.2021.3089102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara et al. recently reported security vulnerabilities of Xu et al.'s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG's security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols.
引用
收藏
页码:88256 / 88271
页数:16
相关论文
共 47 条
  • [1] Al Amiri W., 2020, CONSUM COMM NETWORK, P1, DOI DOI 10.1109/ccnc46108.2020.9045674
  • [2] Al Amiri W., 2019, 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), P1
  • [3] A Hybrid Mobile Authentication Model for Ubiquitous Networking
    Almuhaideb, Abdullah
    Srinivasan, Bala
    Phu Dung Le
    Alhabeeb, Mohammed
    Alfehaid, Waleed
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 360 - 367
  • [4] A secure authentication and key agreement scheme for roaming service with user anonymity
    Arshad, Hamed
    Rasoolzadegan, Abbas
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [5] A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
    Baig, Ahmed Fraz
    ul Hassan, Khwaja Mansoor
    Ghani, Anwar
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Ashraf, Muhammad Usman
    [J]. PLOS ONE, 2018, 13 (04):
  • [6] Detecting Sybil Attacks Using Proofs of Work and Location in VANETs
    Baza, Mohamed
    Nabil, Mahmoud
    Mahmoud, Mohamed M. E. A.
    Bewermeier, Niclas
    Fidan, Kemal
    Alasmary, Waleed
    Abdallah, Mohamed
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 39 - 53
  • [7] Blockchain-based Charging Coordination Mechanism for Smart Grid Energy Storage Units
    Baza, Mohamed
    Nabil, Mahmoud
    Ismail, Muhammad
    Mahmoud, Mohamed
    Serpedin, Erchin
    Rahman, Mohammad Ashiqur
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 504 - 509
  • [8] A secure end-to-end proximity NFC-based mobile payment protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    [J]. COMPUTER STANDARDS & INTERFACES, 2019, 66
  • [9] A secure end-to-end SMS-based mobile banking protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (15)
  • [10] A LOGIC OF AUTHENTICATION
    BURROWS, M
    ABADI, M
    NEEDHAM, RM
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871): : 233 - 271