Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks
- 541 Downloads
Rapid development of wireless networks brings about many security problems in mobile communications. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, Wen et al. proposed such scheme, which is claimed to be a slight modification of Qi et al.’s protocol based on smart card. However, we reveal that both the schemes still suffer from certain weaknesses and thus they cannot achieve desired security. Therefore, here we propose an improved protocol of Wen et al. which can immune to various known types of attacks like forgery attack, replay attack, known session key attack, backward and forward secrecy etc.
KeywordsAuthentication Anonymity Roaming Privacy Untraceability Smart card Global mobile network
This work is financially supported by the National Science Council of Republic of China (Taiwan), under Contract No. NSC MOST 103-2221-E-006-177. The authors would like to thank the National Science Council of Republic of China for their benign supports. The authors also would like thank the editor and the anonymous referee for their valuable comments.
- 7.Lu, J., & Zhou, J. (2010). On the security of an efficient mobile authentication scheme for wireless networks, WICOM2010. 6th International Conference on Wireless Communications Networking and Mobile Computing, (pp. 23–25). New York: IEEE Press.Google Scholar
- 10.Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications. doi: 10.1007/s11277-013-1243-4.
- 12.Stalling, W. (2000). Cryptography and network security principles and practice. New Jersey: Prentice Hall.Google Scholar
- 15.Lo, C. C., & Chen, Y. J. (1997). Secure communication mechanisms for GSM networks. In Proceedings of the IEEE transactions on Consumer Electronics, 45, 1074–1080.Google Scholar
- 17.Hwang, T., & Gope, P. (2013). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications. doi: 10.1007/s11277-013-1501-5.
- 18.TS 33.102: (2001). Security architecture, version 4.2.0, released 4. Third generation partnership project-technical specification group.Google Scholar
- 19.TR 33.902: (2000). Formal analysis of the 3G authentication protocol. Third generation partnership project-authentication and key agreement (AKA).Google Scholar
- 20.Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proc. CRYPTO’99, LNCS 1666 (pp. 388–397). Berlin: Springer.Google Scholar