Secure and efficient authentication protocol with user untraceability for global roaming services

被引:0
|
作者
Prasanta Kumar Roy
Ansuman Bhattacharya
机构
[1] Indian Institute of Technology (Indian School of Mines),
来源
Wireless Networks | 2021年 / 27卷
关键词
Mutual authentication; Session key exchange; Untraceability; Security; Global roaming service.;
D O I
暂无
中图分类号
学科分类号
摘要
In case of global roaming services, user authentication plays an important role in order to prevent any unauthorized user from accessing services. Preserving anonymity and unlinkability are also crucial to ensure user untraceability over public channel. However, achieving user authenticity and untraceability are not sufficient to guarantee a secure communication. Several active and passive attacks may breach the system security as the mode of communication is considered to be wireless. Hence, requiring a well-designed protocol to resist these vulnerabilities. In this article, we put forward a secure and efficient authentication protocol with user untraceability for global roaming services. The proposed protocol utilizes low-cost cryptographic primitives such as symmetric key encryption/decryption and one-way hash function. We use dynamic keys (rather than long-term keys) to ensure forward/backward secrecy of the session key. The use of dynamic pseudonym ensures user anonymity and unlinkability over public channel. In addition, there is no need to re-synchronize the peers in case of desynchronization attack. The security validation of the proposed protocol is done both formally and informally to ensure robustness of the protocol under various active and passive attacks. Finally, we compare our protocol with some recently proposed approaches in terms of various security and design parameters to ensure its efficiency for low-power applications of global roaming services.
引用
收藏
页码:5189 / 5206
页数:17
相关论文
共 50 条
  • [31] A Secure and Efficient Deniable Authentication Protocol
    Xin Xiangjun
    Chen Dongsheng
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 172 - 175
  • [32] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [33] Secure Delegation-Based Authentication Protocol for Wireless Roaming Service
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (07) : 1100 - 1102
  • [34] Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization
    Hsing-Bai Chen
    Yung-Hsiang Lai
    Kuei-Wan Chen
    Wei-Bin Lee
    JournalofElectronicScienceandTechnology, 2011, 9 (04) : 345 - 351
  • [35] Provably secure anonymous authentication with batch verification for mobile roaming services
    Tsai, Jia-Lun
    Lo, Nai-Wei
    AD HOC NETWORKS, 2016, 44 : 19 - 31
  • [36] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    Madhusudhan, R.
    Shashidhara, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 82 - 103
  • [37] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    R. Madhusudhan
    Shashidhara R.
    Peer-to-Peer Networking and Applications, 2020, 13 : 82 - 103
  • [38] A Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Network
    Wu, Kuo-Yang
    Chuang, Yo-Hsuan
    Wu, Tzong-Chen
    Lo, Nai-Wei
    2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING, INTELLIGENT SYSTEM AND INFORMATION TECHNOLOGY (ICSIIT), 2017, : 150 - 154
  • [39] A secure and lightweight authentication scheme for roaming service in global mobile networks
    Madhusudhan, R.
    Shashidhara
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 96 - 110
  • [40] Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network
    Sadhukhan, Dipanwita
    Ray, Sangram
    Dasgupta, Mou
    Khan, Muhammad Khurram
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 224