Anonymous and expeditious mobile user authentication scheme for GLOMONET environments

被引:8
|
作者
Gope, Prosanta [1 ]
Islam, S. K. Hafizul [2 ]
Obaidat, Mohammad S. [3 ]
Amin, Ruhul [4 ]
Vijayakumar, Pandi [5 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore, Singapore
[2] Indian Inst Informat Technol, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Univ Jordan, King Abdullah II Sch Informat Technol KASIT, Amman, Jordan
[4] Dr Shyama Prasad Mukherjee Int Inst Informat Tech, Dept Comp Sci & Engn, Naya Raipur, Chhattisgarh, India
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Melpakkam Tindivanam 604001, Tamil Nadu, India
关键词
Anonymity; BAN logic; GLOMONET; One-time alias; privacy; Random oracle model; PRIVACY-PRESERVING AUTHENTICATION; ROAMING SERVICE; SECURE AUTHENTICATION; PROTOCOL;
D O I
10.1002/dac.3461
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Global Mobility Network (GLOMONET) is rapidly becoming important as well as a popular feature in today's high-performance network. The legal mobile users enjoy life using the ubiquitous services via GLOMONET. However, because of the broadcast nature of the wireless channel, providing user authentication along with the privacy and anonymity of the users in GLOMONET is indeed a challenging task. In this article, we come up with a secure and expeditious mobile communication environment using symmetric key cryptosystem to ensure mobile users' anonymity and privacy against eavesdroppers and backward/forward secrecy of the session key. Our scheme can also protect numerous security threats, like man-in-the-middle attack, known session key attack, lost smartcard attack, and forgery attack. Furthermore, we put forward a new technique named as friendly foreign agent policy, where many foreign agents can make different groups among themselves and perform important responsibilities to authenticate a legitimate mobile user without interfering his or her home agent even though the mobile user moves to a new location, covered by a new foreign agent (belongs to the same group). Security and performance analyses show that the proposed scheme is secure and more efficient as compared with other competitive schemes for GLOMONET environments.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    ZHANG De-dong
    MA Zhao-feng
    NIU Xin-xin
    Peng Yong
    [J]. The Journal of China Universities of Posts and Telecommunications, 2013, (01) : 58 - 65
  • [22] An efficient ID-based user identification scheme for mutual authentication in mobile environments
    Chang, Chin-Chen
    Yang, Jen-Ho
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2006, 9 (03): : 537 - 548
  • [23] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [24] An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Park, Youngho
    [J]. SENSORS, 2020, 20 (04)
  • [25] Anonymous Authentication Scheme without Verification Table for Wireless Environments
    Isawa, Ryoichi
    Morii, Masakatu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (12) : 2488 - 2492
  • [26] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [27] Secure remote anonymous user authentication scheme for smart home environment
    Fakroon, Moneer
    Alshahrani, Mohammed
    Gebali, Fayez
    Traore, Issa
    [J]. INTERNET OF THINGS, 2020, 9
  • [28] Cryptanalysis of a User Anonymous Password Authentication Scheme Without Smart Card
    Lin, Hao
    Wen, Feng-Tong
    Du, Chun-Xia
    [J]. 2016 INTERNATIONAL CONFERENCE ON SERVICE SCIENCE, TECHNOLOGY AND ENGINEERING (SSTE 2016), 2016, : 293 - 298
  • [29] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [30] A lightweight anonymous user authentication and key establishment scheme for wearable devices
    Gupta, Ankur
    Tripathi, Meenakshi
    Shaikh, Tabish Jamil
    Sharma, Aakar
    [J]. COMPUTER NETWORKS, 2019, 149 : 29 - 42