Skip to main content

Advertisement

Log in

A privacy preserving authentication scheme for roaming in ubiquitous networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Ubiquitous networks enable mobile users to communicate with each other efficiently and independently without the need of inventing agent. This approach is proved to be delay and spectral efficient. Due to the nature of underlying Big data, such networks are prone to several security and privacy challenges. Because such gigantic data is not only difficult to store, maintain and manipulate but Big data’s open architecture makes the security threats inevitable. Therefore, incorporating authentication between mobile node and foreign network during roaming in ubiquitous networks has become a tedious task. Very recently, Farash et al. found a number of weaknesses in the schemes proposed by Wen et al. and Shin et al. Furthermore, Farash et al. proposed an enhanced scheme for roaming user in ubiquitous network. However, after thorough investigation, we show fragilities of Farash et al.’s scheme against (1) mobile user anonymity violation; (2) disclosure of secret parameter of mobile node; (3) session key disclosure; and (4) mobile node impersonation attacks. Therefore, we propose an improved scheme to fix these fragilities. We analyze the security of proposed scheme using popular automated verification tool ProVerif. The analysis confirms that the proposed scheme resists the known attacks while having quite low overhead as compared with Farash et al.’s scheme. Therefore, in order to get better performance proposed scheme is a suitable candidate to be employed along with supercomputing systems for dealing the security challenges of big data in ubiquitous networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Victor, N., Lopez, D., Abawajy, J.H.: Privacy models for big data: a survey. Int. J. Big Data Intell. 3(1), 61–75 (2016)

    Article  Google Scholar 

  2. Xing, W., Jie, W., Tsoumakos, D., Ghanem, M.: A network approach for managing and processing big cancer data in clouds. Clust. Comput. 18(3), 1285–1294 (2015). doi:10.1007/s10586-015-0456-6

    Article  Google Scholar 

  3. Shah, T., Rabhi, F., Ray, P.: Investigating an ontology-based approach for big data analysis of inter-dependent medical and oral health conditions. Clust. Comput. 18(1), 351–367 (2015). doi:10.1007/s10586-014-0406-8

    Article  Google Scholar 

  4. Wang, Y., Liu, Z., Liao, H., Li, C.: Improving the performance of gis polygon overlay computation with mapreduce for spatial big data processing. Clust. Comput. 18(2), 507–516 (2015). doi:10.1007/s10586-015-0428-x

    Article  Google Scholar 

  5. Suzuki, S., Nakada, K.: An authentication technique based on distributed security management for the global mobility network. IEEE J. Sel. Areas Commun. 15(8), 1608–1617 (1997)

    Article  Google Scholar 

  6. Yeh, C.-K., Lee, W.-B.: An overall cost-effective authentication technique for the global mobility network. IJ Netw. Secur. 9(3), 227–232 (2009)

    Google Scholar 

  7. Seo, D., Jeon, Y.-B., Lee, S.-H., Lee, K.-H.: Cloud computing for ubiquitous computing on m2m and iot environment mobile application. Clust. Comput. 19(2), 1001–1013 (2016). doi:10.1007/s10586-016-0573-x

    Article  Google Scholar 

  8. Zhu, H., Liu, T., Wei, G., Li, H.: Ppas: privacy protection authentication scheme for vanet. Clust. Comput. 16(4), 873–886 (2013). doi:10.1007/s10586-013-0260-0

    Article  Google Scholar 

  9. Zhang, W., Zhang, Y., Chen, J., Li, H., Wang, Y.: End-to-end security scheme for machine type communication based on generic authentication architecture. Clust. Comput. 16(4), 861–871 (2013). doi:10.1007/s10586-013-0259-6

    Article  Google Scholar 

  10. Lin, L., Liu, T., Hu, J., Ni, J.: Pqsel: combining privacy with quality of service in cloud service selection. Int. J. Big Data Intell. 3(3), 202–214 (2016)

    Article  Google Scholar 

  11. Murugaiyan, S., Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: A generic privacy breach preventing methodology for cloud based web service. Stand. Stand., 426 (2015)

  12. Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electron. 50(1), 231–235 (2004)

    Article  Google Scholar 

  13. Lee, C.-C., Hwang, M.-S., Liao, I.-E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Indus. Electron. 53(5), 1683–1687 (2006)

    Article  Google Scholar 

  14. Wu, C.-C., Lee, W.-B., Tsaur, W.-J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10), 722–723 (2008)

    Article  Google Scholar 

  15. Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1), 214–222 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  16. Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12), 2803–2814 (2008)

    Article  Google Scholar 

  17. Li, C.-T., Lee, C.-C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1), 35–44 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  18. Chen, Y.-C., Chuang, S.-C., Yeh, L.-Y., Huang, J.-L.: A practical authentication protocol with anonymity for wireless access networks. Wirel. Commun. Mob. Comput. 11(10), 1366–1375 (2011)

    Article  Google Scholar 

  19. Chen, C., He, D., Chan, S., Bu, J., Gao, Y., Fan, R.: Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3), 347–362 (2011)

    Article  Google Scholar 

  20. Xie, Q., Hu, B., Tan, X., Bao, M., Yu, X.: Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wirel. Pers. Commun. 74(2), 601–614 (2014)

    Article  Google Scholar 

  21. He, D., Chan, S., Chen, C., Bu, J., Fan, R.: Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 61(2), 465–476 (2011)

    Article  Google Scholar 

  22. Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477–1491 (2013)

    Article  Google Scholar 

  23. Wen, F., Susilo, W., Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993–1004 (2013)

    Article  Google Scholar 

  24. Shin, S., Yeh, H., Kim, K.: An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw. Appl. 8(4), 674–683 (2015). doi:10.1007/s12083-013-0218-2

    Article  Google Scholar 

  25. Farash, M.S., Chaudhry, S.A., Heydari, M., Sadough, S., Mohammad, S., Kumari, S., Khan, M.K.: A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4), e3019 (2017). doi:10.1002/dac.3019

    Article  Google Scholar 

  26. Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.: On the power of power analysis in the real world: a complete break of the keeloq code hopping scheme. In: Wagner D. (ed.) Advances in Cryptology, CRYPTO 2008. Lecture Notes in Computer Science, vol. 5157, pp. 203–220. Springer, Berlin (2008). doi:10.1007/978-3-540-85174-5_12

  27. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983). doi:10.1109/TIT.1983.1056650

    Article  MathSciNet  MATH  Google Scholar 

  28. Kumari, S., Khan, M.K., Li, X., Wu, F.: Design of a user anonymous password authentication scheme without smart card. Int. J. Commun. Syst. 29(3), 441–458 (2016). doi:10.1002/dac.2853

    Article  Google Scholar 

  29. Kumari, S., Li, X., Wu, F., Das, A.K., Odelu, V., Khan, M.K.: A user anonymous mutual authentication protocol. KSII Trans. Internet Inf. Syst. 10(9) (2016)

  30. He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. (2016). doi:10.1109/JSYST.2016.2544805

  31. He, D., Kumar, N., Shen, H., Lee, J.-H.: One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 59(5), 052108 (2016). doi:10.1007/s11432-015-5469-5

    Article  MathSciNet  Google Scholar 

  32. Kumari, S., Li, X., Wu, F., Das, A.K., Arshad, H., Khan, M.K.: A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comput. Syst. 63, 56–75 (2016)

    Article  Google Scholar 

  33. Chaudhry, S.A., Farash, M.S., Naqvi, H., Islam, S.H., Shon, T.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun., 1–25 (2015). doi:10.1007/s11277-015-3139-y

  34. Kumari, S., Chaudhry, S.A., Wu, F., Li, X., Farash, M.S., Khan, M.K.: An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl., 1–15 (2015). doi:10.1007/s12083-015-0409-0

  35. Kilinc, H., Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005–1023 (2014). doi:10.1109/SURV.2013.091513.00050

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taeshik Shon.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chaudhry, S.A., Albeshri, A., Xiong, N. et al. A privacy preserving authentication scheme for roaming in ubiquitous networks. Cluster Comput 20, 1223–1236 (2017). https://doi.org/10.1007/s10586-017-0783-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-0783-x

Keywords

Navigation