Secure and efficient authentication protocol with user untraceability for global roaming services

被引:0
|
作者
Prasanta Kumar Roy
Ansuman Bhattacharya
机构
[1] Indian Institute of Technology (Indian School of Mines),
来源
Wireless Networks | 2021年 / 27卷
关键词
Mutual authentication; Session key exchange; Untraceability; Security; Global roaming service.;
D O I
暂无
中图分类号
学科分类号
摘要
In case of global roaming services, user authentication plays an important role in order to prevent any unauthorized user from accessing services. Preserving anonymity and unlinkability are also crucial to ensure user untraceability over public channel. However, achieving user authenticity and untraceability are not sufficient to guarantee a secure communication. Several active and passive attacks may breach the system security as the mode of communication is considered to be wireless. Hence, requiring a well-designed protocol to resist these vulnerabilities. In this article, we put forward a secure and efficient authentication protocol with user untraceability for global roaming services. The proposed protocol utilizes low-cost cryptographic primitives such as symmetric key encryption/decryption and one-way hash function. We use dynamic keys (rather than long-term keys) to ensure forward/backward secrecy of the session key. The use of dynamic pseudonym ensures user anonymity and unlinkability over public channel. In addition, there is no need to re-synchronize the peers in case of desynchronization attack. The security validation of the proposed protocol is done both formally and informally to ensure robustness of the protocol under various active and passive attacks. Finally, we compare our protocol with some recently proposed approaches in terms of various security and design parameters to ensure its efficiency for low-power applications of global roaming services.
引用
收藏
页码:5189 / 5206
页数:17
相关论文
共 50 条
  • [41] A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
    Karuppiah, Marimuthu
    Kumari, Saru
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Basu, Sayantani
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4192 - 4209
  • [42] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [43] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    JournalofCentralSouthUniversity, 2013, 20 (10) : 2741 - 2746
  • [44] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [45] A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
    Yu, SungJin
    Lee, JoonYoung
    Park, YoHan
    Park, YoungHo
    Lee, SangWoo
    Chung, BoHeung
    APPLIED SCIENCES-BASEL, 2020, 10 (10):
  • [46] An efficient and secure 3-factor user-authentication protocol for multiserver environment
    Luo, Min
    Sun, Aiying
    He, Debiao
    Li, Xiaohong
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (14)
  • [47] An efficient and secure authentication for inter-roaming in wireless heterogeneous network
    Mahshid, Mir-Kamran
    Eslamipoor, Reza
    SOCIAL NETWORK ANALYSIS AND MINING, 2014, 4 (01) : 1 - 10
  • [48] Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services
    Gope, Prosanta
    Hsu, Ruei-Hau
    Lee, Jemin
    Quek, Tony Q. S.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 247 - 252
  • [49] Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service
    Wang, Yichen
    Pu, Qiong
    Wu, Shuhua
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 252 - 260
  • [50] A study on secure user authentication and authorization in OAuth protocol
    Chae, Cheol-Joo
    Kim, Ki-Bong
    Cho, Han-Jin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1991 - 1999