Wireless Personal Communications

, Volume 82, Issue 4, pp 2231–2245 | Cite as

Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks

Article

Abstract

Rapid development of wireless networks brings about many security problems in mobile communications. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, Wen et al. proposed such scheme, which is claimed to be a slight modification of Qi et al.’s protocol based on smart card. However, we reveal that both the schemes still suffer from certain weaknesses and thus they cannot achieve desired security. Therefore, here we propose an improved protocol of Wen et al. which can immune to various known types of attacks like forgery attack, replay attack, known session key attack, backward and forward secrecy etc.

Keywords

Authentication Anonymity Roaming Privacy  Untraceability Smart card Global mobile network 

Notes

Acknowledgments

This work is financially supported by the National Science Council of Republic of China (Taiwan), under Contract No. NSC MOST 103-2221-E-006-177. The authors would like to thank the National Science Council of Republic of China for their benign supports. The authors also would like thank the editor and the anonymous referee for their valuable comments.

References

  1. 1.
    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230–234.MathSciNetGoogle Scholar
  2. 2.
    Lee, C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environment. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRefGoogle Scholar
  3. 3.
    Wu, C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communication Letters, 12(10), 722–723.CrossRefGoogle Scholar
  4. 4.
    Cheng, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhance authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32, 611–618.CrossRefGoogle Scholar
  5. 5.
    Youn, T. Y., Park, T. H., & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks. IEEE Communication Letters, 13(7), 471–473.CrossRefGoogle Scholar
  6. 6.
    Tang, C., & Wu, D. O. (2008). Mobile privacy in wireless networks revisited. IEEE Transactions on Wireless Communication, 7, 1035–1042.CrossRefGoogle Scholar
  7. 7.
    Lu, J., & Zhou, J. (2010). On the security of an efficient mobile authentication scheme for wireless networks, WICOM2010. 6th International Conference on Wireless Communications Networking and Mobile Computing, (pp. 23–25). New York: IEEE Press.Google Scholar
  8. 8.
    He, D., Ma, M., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61, 465–476.CrossRefGoogle Scholar
  9. 9.
    Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wireless Personal Communications, 68, 1477–1491.CrossRefGoogle Scholar
  10. 10.
    Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications. doi: 10.1007/s11277-013-1243-4.
  11. 11.
    Rosen, K. (1988). Elementary number theory and its applications. Boston: Addision Wesley.MATHGoogle Scholar
  12. 12.
    Stalling, W. (2000). Cryptography and network security principles and practice. New Jersey: Prentice Hall.Google Scholar
  13. 13.
    Trappe, W., & Washington, C. (2006). Introduction to cryptography with coding theory. New Jersey: Prentice Hall.MATHGoogle Scholar
  14. 14.
    Chang, C., Lee, J., & Chang, Y. (2005). Efficient authentication protocols of GSM. Computer Communications, 28(8), 921–928.CrossRefGoogle Scholar
  15. 15.
    Lo, C. C., & Chen, Y. J. (1997). Secure communication mechanisms for GSM networks. In Proceedings of the IEEE transactions on Consumer Electronics, 45, 1074–1080.Google Scholar
  16. 16.
    Lee, T. F., Chang, C. C., & Hwang, T. (2005). Private authentication techniques for the global mobility network. Wireless Personal Communications, 35(4), 329–336.CrossRefGoogle Scholar
  17. 17.
    Hwang, T., & Gope, P. (2013). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications. doi: 10.1007/s11277-013-1501-5.
  18. 18.
    TS 33.102: (2001). Security architecture, version 4.2.0, released 4. Third generation partnership project-technical specification group.Google Scholar
  19. 19.
    TR 33.902: (2000). Formal analysis of the 3G authentication protocol. Third generation partnership project-authentication and key agreement (AKA).Google Scholar
  20. 20.
    Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proc. CRYPTO’99, LNCS 1666 (pp. 388–397). Berlin: Springer.Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.National Cheng Kung UniversityTainanTaiwan, ROC

Personalised recommendations