AMAPG: Advanced Mobile Authentication Protocol for GLOMONET

被引:7
|
作者
Rahmani, Amir Masoud [1 ]
Mohammadi, Mokhtar [2 ]
Lansky, Jan [3 ]
Mildeova, Stanislava [3 ]
Safkhani, Masoumeh [4 ]
Kumari, Saru [5 ]
Karim, Sarkhel H. Taher [6 ]
Hosseinzadeh, Mehdi [7 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu 64002, Yunlin, Taiwan
[2] Lebanese French Univ, Coll Engn & Comp Sci, Dept Informat Technol, Erbil, Iraq
[3] Univ Finance & Adm, Fac Econ Studies, Dept Comp Sci & Math, Prague 10100, Czech Republic
[4] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran 1678815811, Iran
[5] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[6] Univ Halabja, Coll Sci, Comp Dept, Halabja, Iraq
[7] Gachon Univ, Pattern Recognit & Machine Learning Lab, Seongnam 13120, South Korea
关键词
Protocols; Authentication; Security; Smart cards; Roaming; Password; Privacy; Global mobility network; roaming; stolen smart card attack; traceability attack; impersonation attack; Scyther; BAN logic; KEY AGREEMENT SCHEME; ROAMING SERVICE; SECURE AUTHENTICATION; USER ANONYMITY;
D O I
10.1109/ACCESS.2021.3089102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara et al. recently reported security vulnerabilities of Xu et al.'s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG's security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols.
引用
收藏
页码:88256 / 88271
页数:16
相关论文
共 50 条
  • [1] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    R. Madhusudhan
    Shashidhara R.
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 82 - 103
  • [2] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    Madhusudhan, R.
    Shashidhara, R.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 82 - 103
  • [3] An Improved Authentication Protocol for Global Mobility Network (GLOMONET)
    Sohail, Malik Muhammad
    Hassan, Mehmood
    Mansoor, Khwaja
    Ghani, Anwar
    Jawad, Khwaja
    [J]. PROCEEDINGS OF 2020 17TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2020, : 401 - 406
  • [4] A novel untraceable authentication scheme for mobile roaming in GLOMONET
    Le, Hai-Duong
    Chang, Chin-Chen
    Chou, Yeh-Chieh
    [J]. International Journal of Network Security, 2015, 17 (04) : 395 - 404
  • [5] Anonymous and expeditious mobile user authentication scheme for GLOMONET environments
    Gope, Prosanta
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    Vijayakumar, Pandi
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (02)
  • [6] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [7] Secure Authentication Protocol for Mobile Payment
    Fan, Kai
    Li, Hui
    Jiang, Wei
    Xiao, Chengsheng
    Yang, Yintang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 610 - 620
  • [8] An efficient authentication protocol for mobile networks
    Shieh, SP
    Ho, FS
    Huang, YL
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 505 - 520
  • [9] A robust protocol for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. 2002 IEEE PROCEEDINGS OF THE NINETEENTH NATIONAL RADIO SCIENCE CONFERENCE, VOLS 1 AND 2, 2002, : 255 - 261
  • [10] An optimized authentication protocol for mobile networks
    Mir-Kamran Mahshid
    Reza Eslamipoor
    [J]. Neural Computing and Applications, 2014, 25 : 379 - 385