Abstract
Due to its convenience and simplicity, the mobile application in the mobile devices has been widely used as necessary. As an essential way to provide secured communication between mobile users and servers, the authentication protocol for user devices has stirred active study. However, because mobile devices are limited on computing capability and energy, it still remains a difficult problem for designing a secure and efficient authentication and key agreement protocol for mobile devices. In this paper, we propose a new efficient and secure Identity-based authentication and key agreement protocol using elliptic curve cryptosystem for mobile devices. Security analysis and complexity comparisons show our proposed protocol can fulfill all of security requirements while has lower computation and communication costs than similar protocols for mobile devices.
Similar content being viewed by others
References
Ericsson mobility report (2015). http://www.ericsson.com/ericsson-mobility-report
Abi-Char, P.E., Mhamed, A., & Bachar, E.H. (2007). A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), pp. 235–240. IEEE.
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.
Boneh, D., & Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM journal on computing, 32(3), 586–615.
Burrows, M., Abadi, M., & Needham, R.M. (1989). A logic of authentication. In Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 426 (pp. 233–271). The Royal Society.
Cao, X., Kou, W., Dang, L., & Zhao, B. (2008). Imbas: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer communications, 31(4), 659–667.
Chen, Z.G., & Song, X.X. (2007). A distributed electronic authentication scheme based on elliptic curve. In 2007 International Conference on Machine Learning and Cybernetics, 4 (pp. 2179–2182). IEEE.
Das, M. L., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers & Security, 25(3), 184–189.
Debiao, H., Jianhua, C., & Jin, H. (2012). An id-based client authentication with key agreement protocol for mobile client-server environment on ecc with provable security. Information Fusion, 13(3), 223–230.
Fang, G., & Huang, G. (2006). Improvement of recently proposed Remote User Authentication Schemes. Cryptology ePrint Archive, Report 2006/200. http://eprint.iacr.org/2006/200.
Giri, D., & Srivastava, P. D. (2006). An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings. Cryptology ePrint Archive, Report 2006/274. http://eprint.iacr.org/2006/274.
Goriparthi, T., Das, M. L., Negi, A., & Saxena, A. (2006). Cryptanalysis of recently proposed Remote User Authentication Schemes. Cryptology ePrint Archive, Report 2006/028. http://eprint.iacr.org/2006/028.
Goriparthi, T., Das, M. L., & Saxena, A. (2009). An improved bilinear pairing based remote user authentication scheme. Computer Standards & Interfaces, 31(1), 181–185.
He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.
He, D., Chen, C., Bu, J., Chan, S., & Zhang, Y. (2013). Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. IEEE Communications Magazine, 51(2), 142–150.
Hughes, D., & Shmatikov, V. (2004). Information hiding, anonymity and privacy: a modular approach. Journal of Computer security, 12(1), 3–36.
Jiang, C., Li, B., & Xu, H. (2007). An efficient scheme for user authentication in wireless sensor networks. In Advanced Information Networking and Applications Workshops, 2007, AINAW’07. 21st International Conference on, 1 (pp. 438–442). IEEE.
Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209.
Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography. In N. Koblitz (Ed.), Towards a quarter-century of public key cryptography (pp. 103–123). Berlin: Springer.
Scott, M., Costigan, N., & Abdulwahab, W. (2006). Implementing cryptographic pairings on smartcards. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 134–147). Berlin: Springer.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 47–53). Berlin: Springer.
Tian, X., Wong, D. S., & Zhu, R. W. (2005). Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications letters, 9(11), 970–972.
Tsai, J. L., & Lo, N. W. (2015). Provably secure and efficient anonymous id-based authentication protocol for mobile devices using bilinear pairings. Wireless Personal Communications, 83(2), 1273–1286.
Wang, D., & Ma, C. G. (2013). Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ecc. Information Fusion, 14(4), 498–503.
Wang, Y. (2013). Effcient identity-based and authenticated key agreement protocol. Trans-actions on Computational Science Xvii (pp. 172–197). Berlin: Springer.
Wu, T. Y., & Tseng, Y. M. (2010). An efficient user authentication and key exchange protocol for mobile client-server environment. Computer Networks, 54(9), 1520–1530.
Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security, 9(12), 2327–2339.
Xuefei, C., Weidong, K., Yong, Y., & Rong, S. (2008). Identity-based authenticated key agreement protocols without bilinear pairings. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 91(12), 3833–3836.
Yang, J. H., & Chang, C. C. (2009). An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & security, 28(3), 138–143.
Yoon, E.J., & Yoo, K.Y. (2009). Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. In Computational Science and Engineering, 2009. CSE’09. International Conference on, 2 (pp. 633–640). IEEE.
Yoon, E.J., & Yoo, K.Y. (2010). A new efficient id-based user authentication and key exchange protocol for mobile client-server environment. In 2010 IEEE International Conference on Wireless Information Technology and Systems.
Zhang, Y., Chen, J., Huang, B., & Peng, C. (2014). An efficient password authentication scheme using smart card based on elliptic curve cryptography. Information Technology And Control, 43(4), 390–401.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, L., Zhang, Y., Xie, Y. et al. An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices. Wireless Pers Commun 94, 3371–3387 (2017). https://doi.org/10.1007/s11277-016-3781-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3781-z