Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Due to its convenience and simplicity, the mobile application in the mobile devices has been widely used as necessary. As an essential way to provide secured communication between mobile users and servers, the authentication protocol for user devices has stirred active study. However, because mobile devices are limited on computing capability and energy, it still remains a difficult problem for designing a secure and efficient authentication and key agreement protocol for mobile devices. In this paper, we propose a new efficient and secure Identity-based authentication and key agreement protocol using elliptic curve cryptosystem for mobile devices. Security analysis and complexity comparisons show our proposed protocol can fulfill all of security requirements while has lower computation and communication costs than similar protocols for mobile devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Ericsson mobility report (2015). http://www.ericsson.com/ericsson-mobility-report

  2. Abi-Char, P.E., Mhamed, A., & Bachar, E.H. (2007). A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), pp. 235–240. IEEE.

  3. Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.

    Article  Google Scholar 

  4. Boneh, D., & Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM journal on computing, 32(3), 586–615.

    Article  MathSciNet  MATH  Google Scholar 

  5. Burrows, M., Abadi, M., & Needham, R.M. (1989). A logic of authentication. In Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 426 (pp. 233–271). The Royal Society.

  6. Cao, X., Kou, W., Dang, L., & Zhao, B. (2008). Imbas: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer communications, 31(4), 659–667.

    Article  Google Scholar 

  7. Chen, Z.G., & Song, X.X. (2007). A distributed electronic authentication scheme based on elliptic curve. In 2007 International Conference on Machine Learning and Cybernetics, 4 (pp. 2179–2182). IEEE.

  8. Das, M. L., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers & Security, 25(3), 184–189.

    Article  Google Scholar 

  9. Debiao, H., Jianhua, C., & Jin, H. (2012). An id-based client authentication with key agreement protocol for mobile client-server environment on ecc with provable security. Information Fusion, 13(3), 223–230.

    Article  Google Scholar 

  10. Fang, G., & Huang, G. (2006). Improvement of recently proposed Remote User Authentication Schemes. Cryptology ePrint Archive, Report 2006/200. http://eprint.iacr.org/2006/200.

  11. Giri, D., & Srivastava, P. D. (2006). An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings. Cryptology ePrint Archive, Report 2006/274. http://eprint.iacr.org/2006/274.

  12. Goriparthi, T., Das, M. L., Negi, A., & Saxena, A. (2006). Cryptanalysis of recently proposed Remote User Authentication Schemes. Cryptology ePrint Archive, Report 2006/028. http://eprint.iacr.org/2006/028.

  13. Goriparthi, T., Das, M. L., & Saxena, A. (2009). An improved bilinear pairing based remote user authentication scheme. Computer Standards & Interfaces, 31(1), 181–185.

    Article  Google Scholar 

  14. He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.

    Article  Google Scholar 

  15. He, D., Chen, C., Bu, J., Chan, S., & Zhang, Y. (2013). Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. IEEE Communications Magazine, 51(2), 142–150.

    Article  Google Scholar 

  16. Hughes, D., & Shmatikov, V. (2004). Information hiding, anonymity and privacy: a modular approach. Journal of Computer security, 12(1), 3–36.

    Article  Google Scholar 

  17. Jiang, C., Li, B., & Xu, H. (2007). An efficient scheme for user authentication in wireless sensor networks. In Advanced Information Networking and Applications Workshops, 2007, AINAW’07. 21st International Conference on, 1 (pp. 438–442). IEEE.

  18. Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.

    Article  Google Scholar 

  19. Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209.

    Article  MathSciNet  MATH  Google Scholar 

  20. Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography. In N. Koblitz (Ed.), Towards a quarter-century of public key cryptography (pp. 103–123). Berlin: Springer.

    Chapter  Google Scholar 

  21. Scott, M., Costigan, N., & Abdulwahab, W. (2006). Implementing cryptographic pairings on smartcards. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 134–147). Berlin: Springer.

  22. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 47–53). Berlin: Springer.

  23. Tian, X., Wong, D. S., & Zhu, R. W. (2005). Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications letters, 9(11), 970–972.

    Article  Google Scholar 

  24. Tsai, J. L., & Lo, N. W. (2015). Provably secure and efficient anonymous id-based authentication protocol for mobile devices using bilinear pairings. Wireless Personal Communications, 83(2), 1273–1286.

    Article  Google Scholar 

  25. Wang, D., & Ma, C. G. (2013). Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ecc. Information Fusion, 14(4), 498–503.

    Article  Google Scholar 

  26. Wang, Y. (2013). Effcient identity-based and authenticated key agreement protocol. Trans-actions on Computational Science Xvii (pp. 172–197). Berlin: Springer.

    Chapter  Google Scholar 

  27. Wu, T. Y., & Tseng, Y. M. (2010). An efficient user authentication and key exchange protocol for mobile client-server environment. Computer Networks, 54(9), 1520–1530.

    Article  MATH  Google Scholar 

  28. Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security, 9(12), 2327–2339.

    Article  Google Scholar 

  29. Xuefei, C., Weidong, K., Yong, Y., & Rong, S. (2008). Identity-based authenticated key agreement protocols without bilinear pairings. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 91(12), 3833–3836.

    Google Scholar 

  30. Yang, J. H., & Chang, C. C. (2009). An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & security, 28(3), 138–143.

    Article  Google Scholar 

  31. Yoon, E.J., & Yoo, K.Y. (2009). Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. In Computational Science and Engineering, 2009. CSE’09. International Conference on, 2 (pp. 633–640). IEEE.

  32. Yoon, E.J., & Yoo, K.Y. (2010). A new efficient id-based user authentication and key exchange protocol for mobile client-server environment. In 2010 IEEE International Conference on Wireless Information Technology and Systems.

  33. Zhang, Y., Chen, J., Huang, B., & Peng, C. (2014). An efficient password authentication scheme using smart card based on elliptic curve cryptography. Information Technology And Control, 43(4), 390–401.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, L., Zhang, Y., Xie, Y. et al. An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices. Wireless Pers Commun 94, 3371–3387 (2017). https://doi.org/10.1007/s11277-016-3781-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3781-z

Keywords