A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments

被引:0
作者
R. Madhusudhan
R. Shashidhara
机构
[1] National Institute of Technology Karnataka,Department of Mathematical and Computational Sciences
来源
Arabian Journal for Science and Engineering | 2020年 / 45卷
关键词
Authentication; Global roaming; Mobility networks; Privacy; User anonymity; AVISPA;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile user authentication is very crucial to ensure the authenticity and privacy of roaming users in mobility environments. The existing communication technologies are highly vulnerable to security threats and pose a great challenge for the wireless networks being used today. Because the mode of a wireless channel is open, these networks do not carry any inherent security and hence are more prone to threats. Consequently, designing a robust scheme for roaming service in the mobile environment is always challenging. Recently, Kuo et al. proposed an efficient authentication protocol for roaming and they claimed that the protocol can resist several security threats in mobile networks. In this paper, we analyze the security of Kuo et al.’s. authentication protocol and show that the protocol is exposed to an insider attack, replay attack, denial-of-service attack and cannot provide fair key agreement, user untraceability, and local password verification. To combat these security flaws, we propose a secure authentication scenario for roaming service using elliptic curve cryptosystem. The proposed authentication protocol is implemented in HLPSL language using automated validation of internet security protocols and applications as a formal verification tool to prove that the novel protocol is free from known attacks. Further, we applied Burrows–Abadi–Needham logic to validate the correctness of the authentication system. The proposed protocol not only improves security but also retains a low communicational and computational overhead.
引用
收藏
页码:2993 / 3014
页数:21
相关论文
共 107 条
[1]  
Suzuki S(1997)An authentication technique based on distributed security management for the global mobility network IEEE J. Sel. Areas Commun. 15 1608-1617
[2]  
Nakada K(2011)An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks Comput. Commun. 34 319-325
[3]  
Xu J(2015)A secure authentication scheme with user anonymity for roaming service in global mobility networks Wirel. Pers. Commun. 84 2055-2078
[4]  
Zhu W-T(2014)Robust two-factor authentication and key agreement preserving user privacy Int. J. Netw. Secur. 16 229-240
[5]  
Feng D-G(2018)Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges Future Gener. Comput. Syst. 78 680-698
[6]  
Karuppiah M(2014)Robust anonymous two-factor authentication scheme for roaming service in global mobility network Wirel. Pers. Commun. 74 601-614
[7]  
Saravanan R(2013)An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks Wirel. Pers. Commun. 68 1477-1491
[8]  
Jiang Q(2015)An efficient and robust anonymous authentication scheme in global mobility networks Int. J. Secur. Appl. 9 297-312
[9]  
Ma J(2011)A user friendly authentication scheme with anonymity for wireless communications Comput. Electr. Eng. 37 356-364
[10]  
Li G(2006)Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Trans. Ind. Electron. 53 1683-1687