Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem

Published: 01 September 2016 Publication History

Abstract

With the fast development of the Internet technology, there is an exponential growth in wireless networks-enabled applications across the globe. To ensure secure communication among all such applications, the authentication with key agreement has received maximum attention in recent times. Recently, Li et al. proposed an authentication with key agreement scheme using elliptic curve cryptosystem (ECC) for wireless mobile communications and claimed that their scheme could withstand different kinds of attacks. However, we find that their scheme cannot withstand various existing attacks. Also, their scheme suffers from the inefficiency of multiple secret keys. To improve security and performance, we propose a security-enhanced authentication with key agreement scheme using ECC for wireless mobile communications. Our analysis shows that the proposed scheme not only solves the security problems in Li et al.'s scheme, but also has better performance with respect to various selected metrics.

References

[1]
Suzukiz S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608---1617
[2]
Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Personal Commun 68(4):1477---1491
[3]
Abolhasan M, Wysocki T, Dutkiewicz E (2004) A review of routing protocols for mobile ad hoc networks. Ad hoc Netw 2(1):1---22
[4]
Gu D, Zhang J (2003) QoS enhancement in IEEE 802. 11 wireless local area networks. IEEE Commun Mag 41(6):120---124
[5]
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770---772
[6]
Hwang M, Li L (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28---30
[7]
Sun H (2000) An efficient remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):958---961
[8]
Lu R, Cao Z, Zhu H (2007) An enhanced authenticated key agreement protocol for wireless mobile communication. Comput Stand Interfaces 29:647---652
[9]
Lo J, Lee C, Hwang M (2010) A secure and efficient ECC-based AKA protocol for wireless mobile communications. Int J Innov Comput Inform Control 6(11):5249---5258
[10]
He D, Wu S, Chen J (2012) Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'. Math Comput Modell 55(3---4):1661---1664
[11]
Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer Peer Netw Appl 8(6):1070---1081
[12]
Li X, Niu J, Ma J, Wang W, Liu CL (2011) Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 34(1):73---79
[13]
Li X, Zhang Y (2013) A simple and robust anonymous two-factor authenticated key exchange protocol. Secur Commun Netw 6(6):711---722
[14]
Li W, Wen Q, Su Q, Jin Z (2012) An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput Commun 35(2):188---195
[15]
Jiang Q, Ma J, Li G, Yang L (2014) An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel Personal Commun 77(2):1489---1506
[16]
Niu J, Li X (2014) A novel user authentication scheme with anonymity for wireless communications. Secur Commun Netw 7(10):1467---1476
[17]
Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929---936
[18]
Li X, Niu J, Kumari S, Liao J, Liang W, Khan M (2015) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur Commun Netw.
[19]
Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171---178
[20]
He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform Sci 321(1):263---277
[21]
He D, Zeadally S (2015) Authentication protocol for ambient assisted living system. IEEE Commun Mag 35(1):71---77
[22]
He D, Kumar N, Chen J et al (2015) Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimed Syst 21(1):49---60
[23]
He D, Wang D (2015) Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst J 9(3):816---823
[24]
Rhee H, Kwon J, Lee D (2009) A remote user authentication scheme without using smart cards. Comput Stand Interfaces 31(1):6---13
[25]
Li X, Wen Q, Zhang H, Jin Z (2013) An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int J Netw Mgmt 23:311---324

Cited By

View all
  • (2018)A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment systemThe Journal of Supercomputing10.5555/3211601.321165974:5(1973-1993)Online publication date: 1-May-2018
  • (2017)A password based authentication scheme for wireless multimedia systemsMultimedia Tools and Applications10.1007/s11042-017-4701-276:24(25893-25918)Online publication date: 1-Dec-2017
  • (2017)Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog ComputingMobile Networks and Applications10.1007/s11036-017-0851-822:5(848-858)Online publication date: 1-Oct-2017
  1. A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image The Journal of Supercomputing
      The Journal of Supercomputing  Volume 72, Issue 9
      September 2016
      393 pages

      Publisher

      Kluwer Academic Publishers

      United States

      Publication History

      Published: 01 September 2016

      Author Tags

      1. Authentication scheme
      2. Security
      3. Wireless mobile communications

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment systemThe Journal of Supercomputing10.5555/3211601.321165974:5(1973-1993)Online publication date: 1-May-2018
      • (2017)A password based authentication scheme for wireless multimedia systemsMultimedia Tools and Applications10.1007/s11042-017-4701-276:24(25893-25918)Online publication date: 1-Dec-2017
      • (2017)Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog ComputingMobile Networks and Applications10.1007/s11036-017-0851-822:5(848-858)Online publication date: 1-Oct-2017

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media