An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city

被引:0
作者
Xiong Li
Arun Kumar Sangaiah
Saru Kumari
Fan Wu
Jian Shen
Muhammad Khurram Khan
机构
[1] Hunan University of Science and Technology,School of Computer Science and Engineering
[2] VIT University,School of Computing Science and Engineering
[3] Ch. Charan Singh University,Department of Mathematics
[4] Xiamen Institute of Technology,Department of Computer Science and Engineering
[5] Nanjing University of Information Science and Technology,School of Computer and Software
[6] King Saud University,Center of Excellence in Information Assurance
来源
Personal and Ubiquitous Computing | 2017年 / 21卷
关键词
Smart city; GLOMONET; User authentication; Key agreement; Anonymity;
D O I
暂无
中图分类号
学科分类号
摘要
Smart city improves quality of life for urban residents by using multiple information and communication technologies. As the network infrastructure of smart city, GLObal MObility NETwork (GLOMONET) can offer seamless network connection service for mobile subscribers. Whereas, because of the opening characteristics of wireless channel and various attacks, security becomes a vital issue in GLOMONET. Recently, Karuppiah and Saravanan proposed an enhanced user authentication for roaming service in GLOMONET. Unfortunately, their scheme lacks the features of session key update and perfect forward secrecy, and the session key can be revealed by home agent. Besides, their scheme faces clock synchronization problem and efficiency problem. In order to provide secure authentication service, a novel ECC (elliptic curve cryptosystem)- based user authentication scheme for roaming service in smart city is proposed in this manuscript. The security features of the proposed scheme are formally evaluated by using provable security method under random oracle model and also present informal analysis. In addition, comparative analysis is given among our scheme and relevant protocols. The results of comparative analysis illustrate that the proposed protocol provides robust and efficient for roaming service in smart city.
引用
收藏
页码:791 / 805
页数:14
相关论文
共 138 条
[1]  
Au MH(2013)Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction Theor Comput Sci 469 1-14
[2]  
Liu JK(2013)Realizing fully secure unrestricted id-based ring signature in the standard model based on hibe IEEE Trans Inf Forensics Secur 8 1909-1922
[3]  
Susilo W(2016)Enabling personalized search over encrypted outsourced data with efficiency improvement IEEE Trans Parallel Distrib Syst 27 2546-2559
[4]  
Yuen TH(2015)Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing IEICE Trans Commun 98 190-200
[5]  
Au MH(2015)Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks Wirel Pers Commun 82 2231-2245
[6]  
Liu JK(2014)A variable threshold-value authentication architecture for wireless mesh networks J Internet Technol 15 929-935
[7]  
Susilo W(2011)Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks Wirel Pers Commun 61 465-476
[8]  
Zhou J(2011)A strong user authentication scheme with smart cards for wireless communications Comput Commun 34 367-374
[9]  
Fu Z(2014)Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks Wirel Pers Commun 74 229-243
[10]  
Ren K(2013)An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks Wirel Pers Commun 68 1477-1491