A secure authentication and key agreement scheme for roaming service with user anonymity

被引:15
|
作者
Arshad, Hamed [1 ]
Rasoolzadegan, Abbas [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp Engn, Mashhad, Iran
关键词
authentication; global mobility network (GLOMONET); key agreement; roaming service; security; MUTUAL AUTHENTICATION; MOBILITY; LIGHTWEIGHT; NETWORKS; PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; DESIGN;
D O I
10.1002/dac.3361
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, with the advancement of wireless technologies, global mobility networks offer roaming services for mobile users. Since in global mobility networks the communication channel is public, adversaries can launch different security attacks to breach the security and privacy of data and mobile users. Hence, an authentication and key agreement scheme can be used to provide secure roaming services. It is well known that the conventional authentication schemes are not suitable for global mobility networks, because the authentication server of each network has the credentials of its registered users and thus cannot verify the authenticity of the other mobile users. Hence, for providing secure roaming services, another type of authentication called roaming authentication is required. Hitherto, a large number of authentication protocols have been proposed for global mobility networks. However, most of them have been proved to be insecure against various attacks. This paper proposes a secure and efficient authentication and key agreement scheme for global mobility networks. The proposed scheme is based on the elliptic curve cryptosystem. The correctness of the proposed scheme is verified using Burrows-Abadi-Needham logic. In addition, the security of the proposed scheme is proved using ProVerif. Detailed analyses demonstrate that the proposed scheme not only withstands various security attacks but also improves the efficiency by reducing the computational costs.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city
    Xiong Li
    Arun Kumar Sangaiah
    Saru Kumari
    Fan Wu
    Jian Shen
    Muhammad Khurram Khan
    [J]. Personal and Ubiquitous Computing, 2017, 21 : 791 - 805
  • [2] An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city
    Li, Xiong
    Sangaiah, Arun Kumar
    Kumari, Saru
    Wu, Fan
    Shen, Jian
    Khan, Muhammad Khurram
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 791 - 805
  • [3] A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
    Marimuthu Karuppiah
    R. Saravanan
    [J]. Wireless Personal Communications, 2015, 84 : 2055 - 2078
  • [4] A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
    Karuppiah, Marimuthu
    Saravanan, R.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 2055 - 2078
  • [5] A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
    Karuppiah, Marimuthu
    Kumari, Saru
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Basu, Sayantani
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4192 - 4209
  • [6] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [7] A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS
    Li, Chun-Ta
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 69 - 76
  • [8] An improved user authentication and key agreement scheme for roaming service in ubiquitous network
    Shaheena Khatoon
    Te-Yu Chen
    Cheng-Chi Lee
    [J]. Annals of Telecommunications, 2022, 77 : 621 - 640
  • [9] An improved user authentication and key agreement scheme for roaming service in ubiquitous network
    Khatoon, Shaheena
    Chen, Te-Yu
    Lee, Cheng-Chi
    [J]. ANNALS OF TELECOMMUNICATIONS, 2022, 77 (9-10) : 621 - 640
  • [10] An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    Shin, Soobok
    Yeh, Hongjin
    Kim, Kangseok
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 674 - 683