Advertisement

A novel DNA based password authentication system for global roaming in resource-limited mobile environments

  • Madhusudhan REmail author
  • Shashidhara R
Article
  • 37 Downloads

Abstract

Mobile environments are highly vulnerable to security threats and pose a great challenge for the wireless and mobile networks being used today. Because the mode of a wireless channel is open, these networks do not carry any inherent security and hence are more prone to attacks. Therefore, designing a secure and robust protocol for authentication in a global mobile network is always a challenging. In these networks, it is crucial to provide authentication to establish a secure communication between the Mobile User (MU), Foreign Agent (FA) and Home Agent (HA). In order to secure communication among these entities, a number of authentication protocols have been proposed. The main security flaw of the existing authentication protocols is that attackers have the ability to impersonate a legal user at any time. Moreover, the existing authentication protocols in the literature are exposed to various kind of cryptographic attacks. Besides, the authentication protocols require larger key length and more computation overhead. To remedy these weaknesses in mobility networks, DNA (Deoxyribo Nucleic Acid) based authentication scheme using Hyper Elliptic Curve Cryptosystem (HECC) is introduced. It offers greater security and allows an MU, FA and HA to establish a secure communication channel, in order to exchange the sensitive information over the radio link. The proposed system derive benefit from HECC, which is smaller in terms of key size, more computational efficiency. In addition, the security strength of this authentication system is validated through widely accepted security verification tool called ProVerif. Further, the performance analysis shows that the DNA based authentication system using HECC is secure and practically implementable in the resource-constrained mobility nodes.

Keywords

Authentication DNA cryptography User anonymity Global roaming Security Smart-card 

Notes

References

  1. 1.
    Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: a progress report. In: Computer aided verification. Springer, pp 35–49Google Scholar
  2. 2.
    Adleman LM (1998) Computing with dna. Scientific American 279(8):34–41Google Scholar
  3. 3.
    Ahmed K, El-Henawy I (2017) Increasing robustness of data encryption standard by integrating dna cryptography. Int J Comput Appl 39(2):91–105Google Scholar
  4. 4.
    Arshad H, Rasoolzadegan A (2017) A secure authentication and key agreement scheme for roaming service with user anonymity. International Journal of Communication SystemsGoogle Scholar
  5. 5.
    Chang C, Lee C, Chiu Y (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618Google Scholar
  6. 6.
    Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory 22(6):644–654MathSciNetzbMATHGoogle Scholar
  7. 7.
    ElGamal T (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology. Springer, pp 10–18Google Scholar
  8. 8.
    Eom S, Huh J-H (2018) Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment. Journal of Ambient Intelligence and Humanized Computing, 1–11Google Scholar
  9. 9.
    Ezziane Z (2005) Dna computing: applications and challenges. Nanotechnology 17(2):27Google Scholar
  10. 10.
    Fadell A, Hodge A, Schell S, Caballero R, Dorogusker JL, Zadesky S, Sanford E (2015) Embedded authentication systems in an electronic device. Google Patents. US Patent 9,134,896Google Scholar
  11. 11.
    Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379Google Scholar
  12. 12.
    Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. Int J Secur Appl 9(10):297–312Google Scholar
  13. 13.
    He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374Google Scholar
  14. 14.
    Huh J-H (2017) Plc-based design of monitoring system for ict-integrated vertical fish farm. Human-centric Computing and Information Sciences 7(1):20Google Scholar
  15. 15.
    Huh J-H, Kim T-J (2019) A location-based mobile health care facility search system for senior citizens. The Journal of Supercomputing 75(4):1831–1848Google Scholar
  16. 16.
    Jemimah J, Muthumeenakshi K, Radha S (2018) Web based biometric validation using biological identities: an elaborate survey. In: 2018 fourth international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB). IEEE, pp 1–6Google Scholar
  17. 17.
    Jeon W, Lee Y, Won D (2013) An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications 7(4):1–5Google Scholar
  18. 18.
    Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491Google Scholar
  19. 19.
    Karuppiah M, Kumari S, Li X, Wu F, Das AK, Khan MK, Saravanan R, Basu S (2017) A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 93 (2):383–407Google Scholar
  20. 20.
    Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84 (3):2055–2078Google Scholar
  21. 21.
    Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209MathSciNetzbMATHGoogle Scholar
  22. 22.
    Koblitz N (1990) A family of jacobians suitable for discrete log cryptosystems. In: Proceedings on advances in cryptology. Springer, New York, pp 94–99Google Scholar
  23. 23.
    Kumari S, Khan MK (2014) More secure smart card-based remote user password authentication scheme with user anonymity. Secur Commun Netw 7(11):2039–2053Google Scholar
  24. 24.
    Kuo W, Wei H, Cheng C (2014) An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications 19 (1):18–24Google Scholar
  25. 25.
    Lai X, Lu M, Qin L, Han J, Fang X (2010) Asymmetric encryption and signature method with dna technology. Sci China Inf Sci 53(3):506–514MathSciNetGoogle Scholar
  26. 26.
    Lee C, Hwang M, Liao E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5):1683–1687Google Scholar
  27. 27.
    Lee C-C, Lai Y, Chen C, Chen S-D (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications: An International Journal 94(3):1281–1296Google Scholar
  28. 28.
    Madhusudhan R, et al. (2016) An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security. ACM, pp 119–126Google Scholar
  29. 29.
    Madhusudhan R, et al. (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110Google Scholar
  30. 30.
    Madhusudhan R, Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in glomonet. Peer-to-Peer Networking and Applications, 1–22Google Scholar
  31. 31.
    Miller V (1986) Use of elliptic curves in cryptography. In: Advances in cryptology—CRYPTO’85 Proceedings. Springer, pp 417–426Google Scholar
  32. 32.
    Misbahuddin M, Sreeja C (2015) A secure image-based authentication scheme employing dna crypto and steganography. In: Proceedings of the third international symposium on women in computing and informatics. ACM, pp 595–601Google Scholar
  33. 33.
    Mun H, Han K, Lee Y, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222MathSciNetzbMATHGoogle Scholar
  34. 34.
    Pelzl J, Wollinger T, Guajardo J, Paar C (2003) Hyperelliptic curve cryptosystems: closing the performance gap to elliptic curves. In: CHES. Springer, pp 351–365Google Scholar
  35. 35.
    Raju P, Parwekar P (2015) Dna encryption based dual server password authentication. In: Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA) 2014. Springer, pp 29–37Google Scholar
  36. 36.
    Rao IRSN, Krishna BM, Shameem S, Khan H, Madhumati G (2016) Wireless secured data transmission using cryptographic techniques through fpga. International Journal of Engineering and Technology (IJET), e-ISSN, 0975–4024Google Scholar
  37. 37.
    Singh H, Chugh K, Dhaka H, Verma A (2010) Dna based cryptography: an approach to secure mobile networks. DNA 1(19):77–80Google Scholar
  38. 38.
    UbaidurRahman NH, Balamurugan C, Mariappan R (2015) A novel dna computing based encryption and decryption algorithm. Procedia Computer Science 46:463–475Google Scholar
  39. 39.
    VijayaKumar P, Vijayalakshmi V, Zayaraz G (2013) Enhanced level of security using dna computing technique with hyperelliptic curve cryptography. Int J Netw Secur 4(1):1Google Scholar
  40. 40.
    Wang X, Zhang Q (2009) Dna computing-based cryptography. In: Fourth international conference on bio-inspired computing, 2009. BIC-TA’09. IEEE, pp 1–3Google Scholar
  41. 41.
    Wu C, Lee W, Tsaur W, et al. (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723Google Scholar
  42. 42.
    Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542Google Scholar
  43. 43.
    Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Annals of Telecommunications 72(3-4):131–144Google Scholar
  44. 44.
    Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83–92Google Scholar
  45. 45.
    Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247–269Google Scholar
  46. 46.
    Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1):231–235Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Mathematical and Computational SciencesNational Institute of Technology KarnatakaSurathkalIndia
  2. 2.School of Engineering & Applied SciencesBennett UniversityGreater NoidaIndia

Personalised recommendations