Skip to main content

Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks

  • Conference paper
  • First Online:
Computational Science and Its Applications -- ICCSA 2016 (ICCSA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9789))

Included in the following conference series:

Abstract

An anonymous authentication scheme provides privacy preserving communication. Recently, many anonymous authentication schemes have been proposed, and various cryptanalysis and improvements have been followed. Some schemes use high-cost functions, such as symmetric and asymmetric cryptographic functions while the others use low-cost functions such as hash functions and simple bitwise operations. The previous schemes are based on the client-server model and a server anonymously authenticates clients. In this paper, we propose an anonymous authentication scheme for communication between client-side devices. The proposed scheme preserves secure inter-device communication by providing anonymous mutual authentication and fair key agreement. Since the proposed scheme uses only low-cost functions, it can apply to mobile networks considering lower energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electron. 50(1), 231–235 (2004)

    Article  MathSciNet  Google Scholar 

  2. Lee, C.C., Hwang, M.S., Lio, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683–1687 (2006)

    Article  Google Scholar 

  3. Wei, Y., Qiu, H., Hu, Y.: Security analysis of authentication scheme with anonymity for wireless environments. In: Proceedings of IEEE International Conference on Communication Technology, pp. 1–4 (2006)

    Google Scholar 

  4. Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10), 722–723 (2008)

    Article  Google Scholar 

  5. Lee, J.S., Chang, J.H., Lee, D.H.: Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 13(5), 292–293 (2009)

    Article  Google Scholar 

  6. Xu, J., Feng, D.: Security flaws in authentication protocols with anonymity for wireless environments. ETRI J. 31, 460–462 (2009)

    Article  MathSciNet  Google Scholar 

  7. Kun, L., Anna, X., Fei, H., Lee, D.H.: Anonymous authentication with unlinkability for wireless environments. IEICE Electron. Express 8(8), 536–541 (2011)

    Article  Google Scholar 

  8. Tsai, J.L., Lo, N.W., Wu, T.C.: Secure anonymous authentication protocol with unlinkability for mobile wireless environment. In: Proceedings of IEEE International Conference on Anti-Counterfeiting Security and Identification, pp. 1–5 (2012)

    Google Scholar 

  9. Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55, 214–222 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  10. Kim, J., Kwak, J.: Improved secure anonymous authentication scheme for roaming service in global mobile network. Int. J. Secur. Appl. 6(3), 45–54 (2012)

    Google Scholar 

  11. Zhao, D., Peng, H., Li, L., Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 78(1), 247–267 (2013)

    Article  Google Scholar 

  12. Jeon, W., Kim, J., Nam, J., Lee, Y., Won, D.: An enhanced secure authentication scheme with anonymity for wireless environments. IEICE Trans. Commun. 95(5), 1819–1821 (2012)

    Google Scholar 

  13. Nam, J., Choo, K.K., Han, S., Kim, M., Paik, J., Won, D.: Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS ONE 10(4), 1–21 (2015)

    Article  Google Scholar 

  14. Zhou, T., Xu, J.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205–213 (2011)

    Article  MATH  Google Scholar 

  15. Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477–1491 (2013)

    Article  Google Scholar 

  16. Wen, F., Susilo, W., Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993–1004 (2013)

    Article  Google Scholar 

  17. Gope, P., Hwang, T.: Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel. Pers. Commun. 82(4), 2231–2245 (2015)

    Article  Google Scholar 

  18. Shin, S., Yeh, H., Kim, K.: An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw. Appl. 8(4), 674–683 (2015)

    Article  Google Scholar 

  19. Farash, M.S., Chaudhry, S.A., Heydari, M., Sadough S.M.S., Kumari, S., Khan, M.K.: A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. (2015). doi:10.1002/dac.3019

    Google Scholar 

  20. Chang, C.C., Lee, C.Y., Chiu, Y.C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32, 611–618 (2009)

    Article  Google Scholar 

  21. Youn, T.Y., Park, Y.H., Lim, J.: Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun. Lett. 13(7), 471–473 (2009)

    Article  Google Scholar 

  22. He, D., Chan, S., Chen, C., Bu, J., Fan, R.: Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 61(2), 465–476 (2011)

    Article  Google Scholar 

  23. Choi, Y., Nam, J., Lee, D., Kim, J., Jung, J., Won, D.: Security enhanced anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Sci. World J. 2014, Article 281305 (2014)

    Google Scholar 

  24. Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443–6462 (2014)

    Article  Google Scholar 

  25. Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. (2015). doi:10.1109/JSYST.2015.2416396

    Google Scholar 

  26. Li, C., Hwang, M., Chung, Y.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31, 2803–2814 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Chung, Y., Choi, S., Won, D. (2016). Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9789. Springer, Cham. https://doi.org/10.1007/978-3-319-42089-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42089-9_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42088-2

  • Online ISBN: 978-3-319-42089-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics