Abstract
The authentication system plays a crucial role in the context of GLObal MObility NETwork (GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service over multiple Foreign Agents (FA). However, designing a robust and anonymous authentication protocol along with a user privacy is essential and challenging task. Due to the resource constrained property of mobile terminals, the broadcast nature of a wireless channel, mobility environments are frequently exposed to several attacks. Many researchers focus their interests on designing an efficient and secure mobile user authentication protocol for mobility networks. Very recently (in 2018), Xu et al presented the novel anonymous authentication system for roaming in GLOMONET, and insisted that their protocol is more secure than existing authentication protocols. The security strength of Xu et al.’s authentication protocol is analysed and identified that the protocol is vulnerable to stolen verifier attack, privileged insider attack, impersonation attack and denial of service attack. In-fact, the protocol suffers from clock synchronization problem and cannot afford local password-verification to detect wrong passwords quickly. As a remedy, we proposed an efficient and robust anonymous authentication protocol for mobility networks. The proposed mobile user authentication protocol achieves the provable security and has the ability to resist against numerous network attacks. Besides, the correctness of the novel authentication protocol is validated using formal security tool called AVISPA (Automated Validation of Internet Security Protocols & Applications). Finally, the performance analysis and simulation results reveals that the proposed authentication protocol is computationally efficient and practically implementable in resource limited mobility environments.
Similar content being viewed by others
References
Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pres Commun 84(3):2055–2078
Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379
Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83–92
Madhusudhan R, Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in glomonet. Peer Peer Netw Appl 1–22
Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235
Lee C, Hwang M, Liao E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687
Wu C, Lee W, Tsaur W, et al. (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
Yoon E, Yoo K (2011) Young, Ha, K.: A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364
Li C, Lee C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44
He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371
Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pres Commun 68(4):1477–1491
Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004
Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pres Commun 78(1):247–269
Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222
Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542
Al Amiri W, Baza M, Mahmoud M, Alasmary W, Akkaya K Towards secure smart parking system using blockchain technology
Amiri WA, Baza M, Banawan K, Mahmoud M, Alasmary W, Akkaya K (2019). Privacy-preserving smart parking system using blockchain and private information retrieval. arXiv:1904.09703
Baza M, Nabil M, Ismail M, Mahmoud M, Serpedin E, Rahman M (2018). Blockchain-based charging coordination mechanism for smart grid energy storage units. arXiv:1811.02001
Baza M, Nabil M, Lasla N, Fidan K, Mahmoud M, Abdallah M (2019) Blockchain-based firmware update scheme tailored for autonomous vehicles. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–7
Zhang R, Xue R, Liu L (2019). Security and privacy on blockchain. arXiv:1903.07602
Baza M, Nabil M, Bewermeier N, Fidan K, Mahmoud M, Abdallah M (2019). Detecting sybil attacks using proofs of work and location in vanets. arXiv:1904.05845
Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8
Guo D, Wen F (2016) A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw Secur 18(2):217–223
Madhusudhan R, et al. (2016) An effcient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security. ACM, pp 119–126
Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann Telecommun 72(3–4):131–144
Bojjagani S, Sastry V (2017) A secure end-to-end sms-based mobile banking protocol. Int J Commun Syst 30(15):3302
Bojjagani S, Sastry V A secure end-to-end proximity nfc-based mobile payment protocol. Comput Stand Inter 66
Karuppiah M, Kumari S, Li X, Wu F, Das AK, Khan MK, Saravanan R, Basu S (2017) A dynamic idbased generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel Pres Commun 93(2):383–407
Arshad H, Rasoolzadegan A (2017) A secure authentication and key agreement scheme for roaming service with user anonymity. Int J Commun Syst
Madhusudhan R, Shashidhara R (2019) A novel dna based password authentication system for global roaming in resource-limited mobile environments. Multimed Tool Appl 1–28
Madhusudhan R, Shashidhara R (2019) A secure anonymous authentication protocol for roaming service in resource-constrained mobility environments. Arab J Sci Eng 1–22
Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. Int J Secur Appl 9(10):297–312
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology—CRYPTO’99. Springer, pp 388–397
Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secur Comput 12(4):428–442
Madhusudhan R, et al. (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inform Secur Appl 38:96–110
Armando A, Basin D, Cuellar J, Rusinowitch M, Viganó L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64
Reddy AG, Das AK, Yoon E-J, Yoo K-Y (2016) A secure anonymous authentication protocol for mobile ser vices on elliptic curve cryptography. IEEE Access 4:4394–4407
Odelu V, Das AK, Kumari S, Huang X, Wazid M (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener Comput Syst 68:74–88
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shashidhara, R., Bojjagani, S., Maurya, A.K. et al. A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 13, 1943–1966 (2020). https://doi.org/10.1007/s12083-020-00929-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00929-y