Abstract
An anonymous authentication scheme provides privacy preserving communication. Recently, many anonymous authentication schemes have been proposed, and various cryptanalysis and improvements have been followed. Some schemes use high-cost functions, such as symmetric and asymmetric cryptographic functions while the others use low-cost functions such as hash functions and simple bitwise operations. The previous schemes are based on the client-server model and a server anonymously authenticates clients. In this paper, we propose an anonymous authentication scheme for communication between client-side devices. The proposed scheme preserves secure inter-device communication by providing anonymous mutual authentication and fair key agreement. Since the proposed scheme uses only low-cost functions, it can apply to mobile networks considering lower energy consumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electron. 50(1), 231–235 (2004)
Lee, C.C., Hwang, M.S., Lio, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683–1687 (2006)
Wei, Y., Qiu, H., Hu, Y.: Security analysis of authentication scheme with anonymity for wireless environments. In: Proceedings of IEEE International Conference on Communication Technology, pp. 1–4 (2006)
Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10), 722–723 (2008)
Lee, J.S., Chang, J.H., Lee, D.H.: Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 13(5), 292–293 (2009)
Xu, J., Feng, D.: Security flaws in authentication protocols with anonymity for wireless environments. ETRI J. 31, 460–462 (2009)
Kun, L., Anna, X., Fei, H., Lee, D.H.: Anonymous authentication with unlinkability for wireless environments. IEICE Electron. Express 8(8), 536–541 (2011)
Tsai, J.L., Lo, N.W., Wu, T.C.: Secure anonymous authentication protocol with unlinkability for mobile wireless environment. In: Proceedings of IEEE International Conference on Anti-Counterfeiting Security and Identification, pp. 1–5 (2012)
Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55, 214–222 (2012)
Kim, J., Kwak, J.: Improved secure anonymous authentication scheme for roaming service in global mobile network. Int. J. Secur. Appl. 6(3), 45–54 (2012)
Zhao, D., Peng, H., Li, L., Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 78(1), 247–267 (2013)
Jeon, W., Kim, J., Nam, J., Lee, Y., Won, D.: An enhanced secure authentication scheme with anonymity for wireless environments. IEICE Trans. Commun. 95(5), 1819–1821 (2012)
Nam, J., Choo, K.K., Han, S., Kim, M., Paik, J., Won, D.: Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS ONE 10(4), 1–21 (2015)
Zhou, T., Xu, J.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205–213 (2011)
Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477–1491 (2013)
Wen, F., Susilo, W., Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993–1004 (2013)
Gope, P., Hwang, T.: Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel. Pers. Commun. 82(4), 2231–2245 (2015)
Shin, S., Yeh, H., Kim, K.: An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw. Appl. 8(4), 674–683 (2015)
Farash, M.S., Chaudhry, S.A., Heydari, M., Sadough S.M.S., Kumari, S., Khan, M.K.: A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. (2015). doi:10.1002/dac.3019
Chang, C.C., Lee, C.Y., Chiu, Y.C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32, 611–618 (2009)
Youn, T.Y., Park, Y.H., Lim, J.: Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun. Lett. 13(7), 471–473 (2009)
He, D., Chan, S., Chen, C., Bu, J., Fan, R.: Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 61(2), 465–476 (2011)
Choi, Y., Nam, J., Lee, D., Kim, J., Jung, J., Won, D.: Security enhanced anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Sci. World J. 2014, Article 281305 (2014)
Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443–6462 (2014)
Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. (2015). doi:10.1109/JSYST.2015.2416396
Li, C., Hwang, M., Chung, Y.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31, 2803–2814 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Chung, Y., Choi, S., Won, D. (2016). Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9789. Springer, Cham. https://doi.org/10.1007/978-3-319-42089-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-42089-9_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42088-2
Online ISBN: 978-3-319-42089-9
eBook Packages: Computer ScienceComputer Science (R0)