A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
- 27 Downloads
The rapid proliferation of mobile networks has made security an important issue, particularly for transaction oriented applications. Recently, Jo et al. presented an efficient authentication protocol for wireless mobile networks and asserted that their proposed approach provides all known security functionalities including session key (SK) security under the assumption of the widely-accepted Canetti–Krawczyk (CK) model. We reviewed Jo et al.’s proposed roaming protocol and we demonstrate that it fails to provide the SK-security under the CK-adversary setting. We then propose an enhancement to Jo et al.’s roaming protocol to address the security drawback found in Jo et al.’s protocol. In the enhanced roaming protocol, we achieve the SK-security along with reduced computation, communication and storage costs. We also simulate the enhanced roaming protocol using NS2 for end-to-end delay and network throughput, and the simulation results obtained demonstrate the efficiency of our protocol.
KeywordsPrivacy Security Authentication Performance Secure roaming
We thank the anonymous reviewers and the Editor for their valuable comments which helped us to improve the quality and presentation of the paper.
- 11.Zhu, H., Pan, W., Liu, B., & Li, H. (2012). A lightweight anonymous authentication scheme for VANET based on bilinear pairing. In Proceedings of the 4th international conference on intelligent networking and collaborative systems (INCoS’12) (pp. 222–228). Bucharest: IEEE.Google Scholar
- 18.Nakanishi, T., & Funabiki, N. (2005). Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In Advances in cryptology (ASIACRYPT’05) (pp. 533–548). Chennai: Springer.Google Scholar
- 21.Han, Q., Zhang, Y., Chen, X., Li, H., & Quan, J. (2012) Efficient and robust identity-based handoff authentication in wireless networks. In Proceedings of the international conference on network and system security (NSS’12) (pp. 180–191). Fujian: Springer.Google Scholar
- 22.Shen, A. N., Guo, S., Zeng, D., & Guizani, M. (2012) A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In Proceedings of the of IEEE wireless communications and networking conference (WCNC’12) (pp. 2543–2548). Paris: IEEE.Google Scholar
- 25.Naranjo, P. G. V., Pooranian, Z., Shojafar, M., Conti, M., & Buyya, R. (2017). Focan: A fog-supported smart city network architecture for management of applications in the internet of everything environments. arXiv preprint arXiv:1710.01801.
- 26.Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Proceedings of advances in cryptology (ASIACRYPT’05) (pp. 515–532). Chennai: Springer.Google Scholar
- 28.Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. In Advances in cryptology (EUROCRYPT’01) (pp. 453–474). Innsbruck, Tyrol: Springer.Google Scholar
- 31.Bellare, M., Canetti, R., & Krawczyk, H. (1998). A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the thirtieth annual ACM symposium on theory of computing (STOC’98) (pp. 419–428), Dallas, TX: ACM.Google Scholar
- 32.The Network Simulator-ns-2. http://www.isi.edu/nsnam/ns/. Accessed on September 2015.
- 35.Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Proceedings of second IEEE workshop on mobile computing systems and applications (WMCSA’99) (pp. 90–100). New Orleans, LA.Google Scholar