A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
- 27 Downloads
Abstract
The rapid proliferation of mobile networks has made security an important issue, particularly for transaction oriented applications. Recently, Jo et al. presented an efficient authentication protocol for wireless mobile networks and asserted that their proposed approach provides all known security functionalities including session key (SK) security under the assumption of the widely-accepted Canetti–Krawczyk (CK) model. We reviewed Jo et al.’s proposed roaming protocol and we demonstrate that it fails to provide the SK-security under the CK-adversary setting. We then propose an enhancement to Jo et al.’s roaming protocol to address the security drawback found in Jo et al.’s protocol. In the enhanced roaming protocol, we achieve the SK-security along with reduced computation, communication and storage costs. We also simulate the enhanced roaming protocol using NS2 for end-to-end delay and network throughput, and the simulation results obtained demonstrate the efficiency of our protocol.
Keywords
Privacy Security Authentication Performance Secure roamingNotes
Acknowledgements
We thank the anonymous reviewers and the Editor for their valuable comments which helped us to improve the quality and presentation of the paper.
References
- 1.Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.CrossRefGoogle Scholar
- 2.Fatemi, M., Salimi, S., & Salahi, A. (2010). Anonymous roaming in universal mobile telecommunication system mobile networks. IET Information Security, 4(2), 93–103.CrossRefGoogle Scholar
- 3.Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRefGoogle Scholar
- 4.Yang, G., Wong, D. S., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 3461–3472.CrossRefGoogle Scholar
- 5.Lee, T. F., & Hwang, T. (2011). Provably secure and efficient authentication techniques for the global mobility network. Journal of Systems and Software, 84(10), 1717–1725.CrossRefGoogle Scholar
- 6.Zhu, H., Lin, X., Shi, M., Ho, P. H., & Shen, X. (2009). PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks. IEEE Transactions on Vehicular Technology, 58(5), 2529–2543.CrossRefGoogle Scholar
- 7.Chang, C. C., & Tsai, H. C. (2010). An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. IEEE Transactions on Wireless Communications, 9(11), 3346–3353.CrossRefGoogle Scholar
- 8.Shi, M., Rutagemwa, H., Shen, X., Mark, J. W., & Saleh, A. (2007). A service-agent-based roaming architecture for WLAN/cellular integrated networks. IEEE Transactions on Vehicular Technology, 56(5), 3168–3181.CrossRefGoogle Scholar
- 9.Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 11953–1966.CrossRefGoogle Scholar
- 10.Chen, C., He, D., Chan, S., Bu, J., Gao, Y., & Fan, R. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24(3), 347–362.CrossRefGoogle Scholar
- 11.Zhu, H., Pan, W., Liu, B., & Li, H. (2012). A lightweight anonymous authentication scheme for VANET based on bilinear pairing. In Proceedings of the 4th international conference on intelligent networking and collaborative systems (INCoS’12) (pp. 222–228). Bucharest: IEEE.Google Scholar
- 12.Tseng, Y., Huang, S., Tsai, T., & Ke, J. (2016). List-free ID-based mutual authentication and key agreement protocol for multi-server architectures. IEEE Transactions on Emerging Topics in Computing, 4(1), 102–112.CrossRefGoogle Scholar
- 13.Chang, C. C., & Lee, C. Y. (2012). A secure single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Electronics, 59(1), 629–637.CrossRefGoogle Scholar
- 14.Wang, G., Yu, J., & Xie, Q. (2013). Security analysis of a single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Informatics, 9(1), 294–302.CrossRefGoogle Scholar
- 15.Odelu, V., Das, A. K., & Goswami, A. (2015). A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks, 8(9), 1732–1751.CrossRefGoogle Scholar
- 16.Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9(1), 168–174.CrossRefGoogle Scholar
- 17.He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431–436.CrossRefGoogle Scholar
- 18.Nakanishi, T., & Funabiki, N. (2005). Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In Advances in cryptology (ASIACRYPT’05) (pp. 533–548). Chennai: Springer.Google Scholar
- 19.He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRefGoogle Scholar
- 20.He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRefGoogle Scholar
- 21.Han, Q., Zhang, Y., Chen, X., Li, H., & Quan, J. (2012) Efficient and robust identity-based handoff authentication in wireless networks. In Proceedings of the international conference on network and system security (NSS’12) (pp. 180–191). Fujian: Springer.Google Scholar
- 22.Shen, A. N., Guo, S., Zeng, D., & Guizani, M. (2012) A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In Proceedings of the of IEEE wireless communications and networking conference (WCNC’12) (pp. 2543–2548). Paris: IEEE.Google Scholar
- 23.Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J., & Kim, K. (2014). Identity-based chameleon hashing and signatures without key exposure. Information Sciences, 265, 198–210.CrossRefGoogle Scholar
- 24.Javanmardi, S., Shojafar, M., Shariatmadari, S., & Ahrabi, S. S. (2014). FR trust: A fuzzy reputation-based model for trust management in semantic P2P grids. International Journal of Grid and Utility Computing, 6(1), 57–66.CrossRefGoogle Scholar
- 25.Naranjo, P. G. V., Pooranian, Z., Shojafar, M., Conti, M., & Buyya, R. (2017). Focan: A fog-supported smart city network architecture for management of applications in the internet of everything environments. arXiv preprint arXiv:1710.01801.
- 26.Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Proceedings of advances in cryptology (ASIACRYPT’05) (pp. 515–532). Chennai: Springer.Google Scholar
- 27.Tsai, J. L., & Lo, N. W. (2016). Provably secure anonymous authentication with batch verification for mobile roaming services. Ad Hoc Networks, 44, 19–31.CrossRefGoogle Scholar
- 28.Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. In Advances in cryptology (EUROCRYPT’01) (pp. 453–474). Innsbruck, Tyrol: Springer.Google Scholar
- 29.Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.CrossRefGoogle Scholar
- 30.Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1(1), 36–63.CrossRefGoogle Scholar
- 31.Bellare, M., Canetti, R., & Krawczyk, H. (1998). A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the thirtieth annual ACM symposium on theory of computing (STOC’98) (pp. 419–428), Dallas, TX: ACM.Google Scholar
- 32.The Network Simulator-ns-2. http://www.isi.edu/nsnam/ns/. Accessed on September 2015.
- 33.Wazid, M., Das, A. K., Kumar, N., & Rodrigues, J. P. C. (2017). Secure three-factor user authentication scheme for renewable energy based smart grid environment. IEEE Transactions on Industrial Informatics, 13(6), 3144–3153.CrossRefGoogle Scholar
- 34.Challa, S., Wazid, M., Das, A. K., Kumar, N., Goutham Reddy, A., Yoon, E. J., et al. (2017). Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access, 5, 3028–3043.CrossRefGoogle Scholar
- 35.Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Proceedings of second IEEE workshop on mobile computing systems and applications (WMCSA’99) (pp. 90–100). New Orleans, LA.Google Scholar