The Journal of Supercomputing

, Volume 72, Issue 9, pp 3588–3600 | Cite as

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem

  • Han Shen
  • Neeraj Kumar
  • Debiao He
  • Jian Shen
  • Naveen Chilamkurti


With the fast development of the Internet technology, there is an exponential growth in wireless networks-enabled applications across the globe. To ensure secure communication among all such applications, the authentication with key agreement has received maximum attention in recent times. Recently, Li et al. proposed an authentication with key agreement scheme using elliptic curve cryptosystem (ECC) for wireless mobile communications and claimed that their scheme could withstand different kinds of attacks. However, we find that their scheme cannot withstand various existing attacks. Also, their scheme suffers from the inefficiency of multiple secret keys. To improve security and performance, we propose a security-enhanced authentication with key agreement scheme using ECC for wireless mobile communications. Our analysis shows that the proposed scheme not only solves the security problems in Li et al.’s scheme, but also has better performance with respect to various selected metrics.


Wireless mobile communications Authentication scheme Security 



The authors thank the editor and the anonymous reviewers for their useful comments and suggestions which helped us improve the quality and presentation of this paper. The work was supported partially by the National Natural Science Foundation of China (Nos. 61402339, 61572379), the CICAEET fund, the PAPD fund and the Natural Science Foundation of Hubei Province of China under Grant 2015CFB257.


  1. 1.
    Suzukiz S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617CrossRefGoogle Scholar
  2. 2.
    Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Personal Commun 68(4):1477–1491CrossRefGoogle Scholar
  3. 3.
    Abolhasan M, Wysocki T, Dutkiewicz E (2004) A review of routing protocols for mobile ad hoc networks. Ad hoc Netw 2(1):1–22CrossRefGoogle Scholar
  4. 4.
    Gu D, Zhang J (2003) QoS enhancement in IEEE 802. 11 wireless local area networks. IEEE Commun Mag 41(6):120–124CrossRefGoogle Scholar
  5. 5.
    Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772MathSciNetCrossRefGoogle Scholar
  6. 6.
    Hwang M, Li L (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28–30CrossRefGoogle Scholar
  7. 7.
    Sun H (2000) An efficient remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):958–961CrossRefGoogle Scholar
  8. 8.
    Lu R, Cao Z, Zhu H (2007) An enhanced authenticated key agreement protocol for wireless mobile communication. Comput Stand Interfaces 29:647–652CrossRefGoogle Scholar
  9. 9.
    Lo J, Lee C, Hwang M (2010) A secure and efficient ECC-based AKA protocol for wireless mobile communications. Int J Innov Comput Inform Control 6(11):5249–5258Google Scholar
  10. 10.
    He D, Wu S, Chen J (2012) Note on ’Design of improved password authentication and update scheme based on elliptic curve cryptography’. Math Comput Modell 55(3–4):1661–1664MathSciNetCrossRefMATHGoogle Scholar
  11. 11.
    Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer Peer Netw Appl 8(6):1070–1081CrossRefGoogle Scholar
  12. 12.
    Li X, Niu J, Ma J, Wang W, Liu CL (2011) Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 34(1):73–79CrossRefGoogle Scholar
  13. 13.
    Li X, Zhang Y (2013) A simple and robust anonymous two-factor authenticated key exchange protocol. Secur Commun Netw 6(6):711–722CrossRefGoogle Scholar
  14. 14.
    Li W, Wen Q, Su Q, Jin Z (2012) An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput Commun 35(2):188–195CrossRefGoogle Scholar
  15. 15.
    Jiang Q, Ma J, Li G, Yang L (2014) An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel Personal Commun 77(2):1489–1506CrossRefGoogle Scholar
  16. 16.
    Niu J, Li X (2014) A novel user authentication scheme with anonymity for wireless communications. Secur Commun Netw 7(10):1467–1476MathSciNetGoogle Scholar
  17. 17.
    Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–936Google Scholar
  18. 18.
    Li X, Niu J, Kumari S, Liao J, Liang W, Khan M (2015) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur Commun Netw. doi: 10.1002/sec.1214
  19. 19.
    Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178Google Scholar
  20. 20.
    He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform Sci 321(1):263–277CrossRefGoogle Scholar
  21. 21.
    He D, Zeadally S (2015) Authentication protocol for ambient assisted living system. IEEE Commun Mag 35(1):71–77CrossRefGoogle Scholar
  22. 22.
    He D, Kumar N, Chen J et al (2015) Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimed Syst 21(1):49–60CrossRefGoogle Scholar
  23. 23.
    He D, Wang D (2015) Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst J 9(3):816–823CrossRefGoogle Scholar
  24. 24.
    Rhee H, Kwon J, Lee D (2009) A remote user authentication scheme without using smart cards. Comput Stand Interfaces 31(1):6–13CrossRefGoogle Scholar
  25. 25.
    Li X, Wen Q, Zhang H, Jin Z (2013) An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int J Netw Mgmt 23:311–324CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Han Shen
    • 1
  • Neeraj Kumar
    • 2
  • Debiao He
    • 3
  • Jian Shen
    • 4
  • Naveen Chilamkurti
    • 5
  1. 1.School of Mathematics and StatisticsWuhan UniversityWuhanChina
  2. 2.Department of Computer Science and EngineeringThapar UniversityPatialaIndia
  3. 3.State Key Lab of Software EngineeringWuhan UniversityWuhanChina
  4. 4.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  5. 5.Department of Computer Science and Computer EngineeringLaTrobe UniversityMelbourneAustralia

Personalised recommendations