Anonymous and expeditious mobile user authentication scheme for GLOMONET environments

被引:8
|
作者
Gope, Prosanta [1 ]
Islam, S. K. Hafizul [2 ]
Obaidat, Mohammad S. [3 ]
Amin, Ruhul [4 ]
Vijayakumar, Pandi [5 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore, Singapore
[2] Indian Inst Informat Technol, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Univ Jordan, King Abdullah II Sch Informat Technol KASIT, Amman, Jordan
[4] Dr Shyama Prasad Mukherjee Int Inst Informat Tech, Dept Comp Sci & Engn, Naya Raipur, Chhattisgarh, India
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Melpakkam Tindivanam 604001, Tamil Nadu, India
关键词
Anonymity; BAN logic; GLOMONET; One-time alias; privacy; Random oracle model; PRIVACY-PRESERVING AUTHENTICATION; ROAMING SERVICE; SECURE AUTHENTICATION; PROTOCOL;
D O I
10.1002/dac.3461
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Global Mobility Network (GLOMONET) is rapidly becoming important as well as a popular feature in today's high-performance network. The legal mobile users enjoy life using the ubiquitous services via GLOMONET. However, because of the broadcast nature of the wireless channel, providing user authentication along with the privacy and anonymity of the users in GLOMONET is indeed a challenging task. In this article, we come up with a secure and expeditious mobile communication environment using symmetric key cryptosystem to ensure mobile users' anonymity and privacy against eavesdroppers and backward/forward secrecy of the session key. Our scheme can also protect numerous security threats, like man-in-the-middle attack, known session key attack, lost smartcard attack, and forgery attack. Furthermore, we put forward a new technique named as friendly foreign agent policy, where many foreign agents can make different groups among themselves and perform important responsibilities to authenticate a legitimate mobile user without interfering his or her home agent even though the mobile user moves to a new location, covered by a new foreign agent (belongs to the same group). Security and performance analyses show that the proposed scheme is secure and more efficient as compared with other competitive schemes for GLOMONET environments.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [2] A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
    Yang, Bin
    Xu, Guangquan
    Zeng, Xianjiao
    Liu, Jia
    Zhang, Yao
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 821 - 827
  • [3] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [4] A three -factor anonymous user authentication scheme for Internet of Things environments
    Lee, Hakjun
    Kang, Dongwoo
    Ryu, Jihyeon
    Won, Dongho
    Kim, Hyoungshick
    Lee, Youngsook
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [5] Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving
    Kang, Dongwoo
    Lee, Hakjun
    Lee, Youngsook
    Won, Dongho
    [J]. PLOS ONE, 2021, 16 (02):
  • [6] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    R. Madhusudhan
    Shashidhara R.
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 82 - 103
  • [7] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [8] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    Madhusudhan, R.
    Shashidhara, R.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 82 - 103
  • [9] An anonymous authentication scheme for mobile communication
    Liu Jin-ye
    Gu Li-ze
    Luo Shou-shan
    Yang Yi-xian
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 359 - +
  • [10] A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments
    Chang, Ya-Fen
    Tai, Wei-Liang
    Hou, Po-Lin
    Lai, Kuan-Yu
    [J]. SYMMETRY-BASEL, 2021, 13 (07):