A secure biometric-based authentication protocol for global mobility networks in smart cities

被引:0
|
作者
Meysam Ghahramani
Reza Javidan
Mohammad Shojafar
机构
[1] Shiraz University of Technology,Computer Engineering and IT Department
[2] University of Surrey,ICS/5GIC
来源
关键词
Smart city; Secure protocol; Mobility network; Formal and informal security analysis; Impersonation attack;
D O I
暂无
中图分类号
学科分类号
摘要
Smart city is an important concept in urban development. The use of information and communication technology to promote quality of life and the management of natural resources is one of the main goals in smart cities. On the other hand, at any time, thousands of mobile users send a variety of information on the network, and this is the main challenge in smart cities. To overcome this challenge and collect data from roaming users, the global mobility network (GLOMONET) is a good approach for information transfer. Consequently, designing a secure protocol for GLOMONET is essential. The main intention of this paper is to provide a secure protocol for GLOMONET in smart cities. To do this, we design a protocol that is based on Li et al.’s protocol, which is not safe against our proposed attacks. Our protocol inherits all the benefits of the previous one; it is entirely secure and does not impose any more communication overhead. We formally analyze the protocol using BAN logic and compare it to similar ones in terms of performance and security, which shows the efficiency of our protocol. Our proposed protocol enables mobile users and foreign agents to share a secret key in 6.1 ms with 428 bytes communication overhead, which improves the time complexity of the previous protocol to 53%.
引用
收藏
页码:8729 / 8755
页数:26
相关论文
共 50 条
  • [41] On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments
    Morteza Adeli
    Nasour Bagheri
    Hamid Reza Meimani
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 3075 - 3089
  • [42] Multimodal Biometric-Based Authentication with Secured Templates
    Choudhary, Swati K.
    Naik, Ameya K.
    [J]. INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2021, 21 (02)
  • [43] Finger-Vein as a Biometric-Based Authentication
    Liu, Chun-Yu
    Ruan, Shanq-Jang
    Lai, Yu-Ren
    Yao, Chih-Yuan
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (06) : 29 - 34
  • [44] Contextual Biometric-Based Authentication for Ubiquitous Services
    Buhan, Ileana
    Lenzini, Gabriele
    Radomirovic, Sasa
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, 2010, 6406 : 680 - +
  • [45] Cryptanalysis of "A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks"
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    [J]. 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 312 - 317
  • [46] Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards
    Wen, Fengtong
    Susilo, Willy
    Yang, Guomin
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (04) : 1747 - 1760
  • [47] Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards
    Fengtong Wen
    Willy Susilo
    Guomin Yang
    [J]. Wireless Personal Communications, 2015, 80 : 1747 - 1760
  • [48] Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    Hu, Bin
    Wong, Duncan S.
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 124 - 129
  • [49] Robust and secure authentication protocol protecting privacy for roaming mobile user in global mobility networks
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (01) : 94 - 111
  • [50] An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card
    Baruah, Khanjan Ch.
    Banerjee, Subhasish
    Dutta, Manash P.
    Bhunia, Chandan T.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 397 - 408