Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Smart city improves quality of life for urban residents by using multiple information and communication technologies. As the network infrastructure of smart city, GLObal MObility NETwork (GLOMONET) can offer seamless network connection service for mobile subscribers. Whereas, because of the opening characteristics of wireless channel and various attacks, security becomes a vital issue in GLOMONET. Recently, Karuppiah and Saravanan proposed an enhanced user authentication for roaming service in GLOMONET. Unfortunately, their scheme lacks the features of session key update and perfect forward secrecy, and the session key can be revealed by home agent. Besides, their scheme faces clock synchronization problem and efficiency problem. In order to provide secure authentication service, a novel ECC (elliptic curve cryptosystem)- based user authentication scheme for roaming service in smart city is proposed in this manuscript. The security features of the proposed scheme are formally evaluated by using provable security method under random oracle model and also present informal analysis. In addition, comparative analysis is given among our scheme and relevant protocols. The results of comparative analysis illustrate that the proposed protocol provides robust and efficient for roaming service in smart city.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Au MH, Liu JK, Susilo W, Yuen TH (2013) Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor Comput Sci 469:1–14

    Article  MathSciNet  MATH  Google Scholar 

  2. Au MH, Liu JK, Susilo W, Zhou J (2013) Realizing fully secure unrestricted id-based ring signature in the standard model based on hibe. IEEE Trans Inf Forensics Secur 8(12):1909– 1922

    Article  Google Scholar 

  3. Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on computer and communications security. ACM, pp 241–250

  4. Farash MS, Chaudhry SA, Heydari M, Sadough S, Mohammad S, Kumari S, Khan MK (2015) A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int J Commun Syst. doi:10.1002/dac.3019

  5. Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546– 2559

    Article  Google Scholar 

  6. Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200

    Article  Google Scholar 

  7. Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82(4):2231–2245

    Article  Google Scholar 

  8. Gope P, Hwang T (2015) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J. doi:10.1109/JSYST.2015.2416396

  9. Guo P, Wang J, Geng XH, Kim CS, Kim J-U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935

    Google Scholar 

  10. He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61(2):465–476

    Article  Google Scholar 

  11. He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374

    Article  Google Scholar 

  12. He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243

    Article  Google Scholar 

  13. Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491

    Article  Google Scholar 

  14. Jiang Q, Ma J, Li G, Yang L (2014) An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel Pers Commun 77(2):1489–1506

    Article  Google Scholar 

  15. Juang W-S (2004) Efficient password authenticated key agreement using smart cards. Comput Secur 23 (2):167–173

    Article  MathSciNet  Google Scholar 

  16. Kang M, Rhee Y-S, Choi J-Y (2011) Improved user authentication scheme with user anonymity for wireless communications. IEICE Trans Fundam Electron Commun Comput Sci 94(2): 860–864

    Article  Google Scholar 

  17. Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84(3):2055–2078

    Article  Google Scholar 

  18. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology-CRYPTO’99. Springer, pp 388–397

  19. Lee C-C, Hwang M-S, Liao I-E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687

    Article  Google Scholar 

  20. Lee J-S, Chang JH, Lee DH (2009) Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun Lett 13(5):292–293

    Article  Google Scholar 

  21. Li C-T, Lee C-C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44

    Article  MathSciNet  MATH  Google Scholar 

  22. Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58(1): 85–95

    Article  Google Scholar 

  23. Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371

    Article  Google Scholar 

  24. Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497

    Google Scholar 

  25. Liu JK, Yuen TH, Au MH, Susilo W (2014) Improvements on an authentication scheme for vehicular sensor networks. Expert Syst Appl 41(5):2559–2564

    Article  Google Scholar 

  26. Mangard S, Oswald E, Standaert F-X (2011) One for all-all for one: unifying standard differential power analysis attacks. IET Inf Secur 5(2):100–110

    Article  Google Scholar 

  27. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    Article  MathSciNet  Google Scholar 

  28. Niu J, Li X (2014) A novel user authentication scheme with anonymity for wireless communications. Secur Commun Netw 7(10):1467–1476

    Google Scholar 

  29. Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323

    Google Scholar 

  30. Shen J, Tan H, Moh S, Chung I, Liu Q, Sun X (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Networks 17(5):453–462

    Article  Google Scholar 

  31. Wang D, He D, Wang P, Chu C (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12(4): 428–442

    Article  Google Scholar 

  32. Wang D, Wang N, Wang P, Qing S (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci 321(321):162–178

    Article  Google Scholar 

  33. Wei Y, Qiu H, Hu Y (2006) Security analysis of authentication scheme with anonymity for wireless environments. In: 2006 international conference on communication technology. IEEE, pp 1–4

  34. Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004

    Article  Google Scholar 

  35. Wu C-C, Lee W-B, Tsaur W-J (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723

    Article  Google Scholar 

  36. Wu F, Xu L (2015) An improved and provable self-certified digital signature scheme with message recovery. Int J Commun Syst 28(2):344–357

    Article  Google Scholar 

  37. Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527– 3542

    Article  Google Scholar 

  38. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  39. Xu J, Feng D (2009) Security flaws in authentication protocols with anonymity for wireless environments. ETRI J 31(4): 460–462

    Article  Google Scholar 

  40. Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260

    Article  Google Scholar 

  41. Yoon E-J, Yoo K-Y, Ha K-S (2011) A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364

    Article  Google Scholar 

  42. Zhang G, Fan D, Zhang Y, Li X, Liu X (2015) A privacy preserving authentication scheme for roaming services in global mobility networks. Secur Commun Netw 8(16):2850–2859

    Article  Google Scholar 

  43. Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China under grant nos. 61300220 & 61572013 & 61572188 & 61672295, and the Scientific Research Fund of Hunan Provincial Education Department under grant no. 16B089. Besides, it is also supported by PAPD, CICAEET, the Deanship of Scientific Research at King Saud University for funding this work through Research Group Number (RG-288), Fujian Education and Scientific Research Program for Young and Middle-aged Teachers under grant no. JA14369, and University Distinguished Young Research Talent Training Program of Fujian Province (Year 2016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiong Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, X., Sangaiah, A.K., Kumari, S. et al. An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Pers Ubiquit Comput 21, 791–805 (2017). https://doi.org/10.1007/s00779-017-1054-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1054-9

Keywords