A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography

被引:60
|
作者
Reddy, Alavalapati Goutham [1 ]
Das, Ashok Kumar [2 ]
Yoon, Eun-Jun [3 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 702701, South Korea
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[3] Kyungil Univ, Dept Cyber Secur, Gyongsan 712701, South Korea
来源
IEEE ACCESS | 2016年 / 4卷
基金
新加坡国家研究基金会;
关键词
Authentication; key-agreement; mobile services; security; AVISPA; ROAMING SERVICE; USER AUTHENTICATION; PASSWORD AUTHENTICATION; SCHEME; EFFICIENT; KEY;
D O I
10.1109/ACCESS.2016.2596292
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentication protocol for location-based services using asymmetric key cryptography. Unlike their claims, the vigilant analysis of this paper substantiates that Memon et al.'s protocol has quite a few limitations such as vulnerability to key compromised impersonation attack, insecure password changing phase, imperfect mutual authentication, and vulnerability to insider attack. Furthermore, this paper proposes an enhanced secure authentication protocol for roaming services on elliptic curve cryptography. The proposed protocol is also a two-factor authentication protocol and is suitable for practical applications due to the composition of light-weight operations. The proposed protocol's formal security is verified using Automated Validation of Internet Security Protocols and Applications tool to certify that the proposed protocol is free from security threats. The informal and formal security analyses along with the performance analysis sections determine that the proposed protocol performs better than Memon et al.'s protocol and other related protocols in terms of security and efficiency.
引用
收藏
页码:4394 / 4407
页数:14
相关论文
共 50 条
  • [1] On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 88 - 91
  • [2] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [3] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    [J]. WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [4] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    [J]. International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [5] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [6] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    [J]. Wireless Networks, 2019, 25 : 415 - 428
  • [7] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [8] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [9] A new mobile secure electronic transaction protocol with elliptic curve cryptography
    Hu, XW
    Zhang, B
    Zhou, FC
    Yan, F
    Li, GJ
    [J]. Proceedings of the Third International Symposium on Magnetic Industry (ISMI'04) & First International Symposium on Physics and IT Industry (ISITI'04), 2005, : 318 - 320
  • [10] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966