A novel DNA based password authentication system for global roaming in resource-limited mobile environments

Abstract

Mobile environments are highly vulnerable to security threats and pose a great challenge for the wireless and mobile networks being used today. Because the mode of a wireless channel is open, these networks do not carry any inherent security and hence are more prone to attacks. Therefore, designing a secure and robust protocol for authentication in a global mobile network is always a challenging. In these networks, it is crucial to provide authentication to establish a secure communication between the Mobile User (MU), Foreign Agent (FA) and Home Agent (HA). In order to secure communication among these entities, a number of authentication protocols have been proposed. The main security flaw of the existing authentication protocols is that attackers have the ability to impersonate a legal user at any time. Moreover, the existing authentication protocols in the literature are exposed to various kind of cryptographic attacks. Besides, the authentication protocols require larger key length and more computation overhead. To remedy these weaknesses in mobility networks, DNA (Deoxyribo Nucleic Acid) based authentication scheme using Hyper Elliptic Curve Cryptosystem (HECC) is introduced. It offers greater security and allows an MU, FA and HA to establish a secure communication channel, in order to exchange the sensitive information over the radio link. The proposed system derive benefit from HECC, which is smaller in terms of key size, more computational efficiency. In addition, the security strength of this authentication system is validated through widely accepted security verification tool called ProVerif. Further, the performance analysis shows that the DNA based authentication system using HECC is secure and practically implementable in the resource-constrained mobility nodes.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

References

  1. 1.

    Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: a progress report. In: Computer aided verification. Springer, pp 35–49

  2. 2.

    Adleman LM (1998) Computing with dna. Scientific American 279(8):34–41

    Google Scholar 

  3. 3.

    Ahmed K, El-Henawy I (2017) Increasing robustness of data encryption standard by integrating dna cryptography. Int J Comput Appl 39(2):91–105

    Google Scholar 

  4. 4.

    Arshad H, Rasoolzadegan A (2017) A secure authentication and key agreement scheme for roaming service with user anonymity. International Journal of Communication Systems

  5. 5.

    Chang C, Lee C, Chiu Y (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618

    Article  Google Scholar 

  6. 6.

    Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory 22(6):644–654

    MathSciNet  MATH  Article  Google Scholar 

  7. 7.

    ElGamal T (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology. Springer, pp 10–18

  8. 8.

    Eom S, Huh J-H (2018) Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment. Journal of Ambient Intelligence and Humanized Computing, 1–11

  9. 9.

    Ezziane Z (2005) Dna computing: applications and challenges. Nanotechnology 17(2):27

    Article  Google Scholar 

  10. 10.

    Fadell A, Hodge A, Schell S, Caballero R, Dorogusker JL, Zadesky S, Sanford E (2015) Embedded authentication systems in an electronic device. Google Patents. US Patent 9,134,896

  11. 11.

    Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379

    Article  Google Scholar 

  12. 12.

    Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. Int J Secur Appl 9(10):297–312

    Google Scholar 

  13. 13.

    He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374

    Article  Google Scholar 

  14. 14.

    Huh J-H (2017) Plc-based design of monitoring system for ict-integrated vertical fish farm. Human-centric Computing and Information Sciences 7(1):20

    Article  Google Scholar 

  15. 15.

    Huh J-H, Kim T-J (2019) A location-based mobile health care facility search system for senior citizens. The Journal of Supercomputing 75(4):1831–1848

    Article  Google Scholar 

  16. 16.

    Jemimah J, Muthumeenakshi K, Radha S (2018) Web based biometric validation using biological identities: an elaborate survey. In: 2018 fourth international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB). IEEE, pp 1–6

  17. 17.

    Jeon W, Lee Y, Won D (2013) An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications 7(4):1–5

    Google Scholar 

  18. 18.

    Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491

    Article  Google Scholar 

  19. 19.

    Karuppiah M, Kumari S, Li X, Wu F, Das AK, Khan MK, Saravanan R, Basu S (2017) A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 93 (2):383–407

    Article  Google Scholar 

  20. 20.

    Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84 (3):2055–2078

    Article  Google Scholar 

  21. 21.

    Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    MathSciNet  MATH  Article  Google Scholar 

  22. 22.

    Koblitz N (1990) A family of jacobians suitable for discrete log cryptosystems. In: Proceedings on advances in cryptology. Springer, New York, pp 94–99

    Google Scholar 

  23. 23.

    Kumari S, Khan MK (2014) More secure smart card-based remote user password authentication scheme with user anonymity. Secur Commun Netw 7(11):2039–2053

    Article  Google Scholar 

  24. 24.

    Kuo W, Wei H, Cheng C (2014) An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications 19 (1):18–24

    Article  Google Scholar 

  25. 25.

    Lai X, Lu M, Qin L, Han J, Fang X (2010) Asymmetric encryption and signature method with dna technology. Sci China Inf Sci 53(3):506–514

    MathSciNet  Article  Google Scholar 

  26. 26.

    Lee C, Hwang M, Liao E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5):1683–1687

    Article  Google Scholar 

  27. 27.

    Lee C-C, Lai Y, Chen C, Chen S-D (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications: An International Journal 94(3):1281–1296

    Article  Google Scholar 

  28. 28.

    Madhusudhan R, et al. (2016) An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security. ACM, pp 119–126

  29. 29.

    Madhusudhan R, et al. (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110

    Google Scholar 

  30. 30.

    Madhusudhan R, Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in glomonet. Peer-to-Peer Networking and Applications, 1–22

  31. 31.

    Miller V (1986) Use of elliptic curves in cryptography. In: Advances in cryptology—CRYPTO’85 Proceedings. Springer, pp 417–426

  32. 32.

    Misbahuddin M, Sreeja C (2015) A secure image-based authentication scheme employing dna crypto and steganography. In: Proceedings of the third international symposium on women in computing and informatics. ACM, pp 595–601

  33. 33.

    Mun H, Han K, Lee Y, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222

    MathSciNet  MATH  Article  Google Scholar 

  34. 34.

    Pelzl J, Wollinger T, Guajardo J, Paar C (2003) Hyperelliptic curve cryptosystems: closing the performance gap to elliptic curves. In: CHES. Springer, pp 351–365

  35. 35.

    Raju P, Parwekar P (2015) Dna encryption based dual server password authentication. In: Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA) 2014. Springer, pp 29–37

  36. 36.

    Rao IRSN, Krishna BM, Shameem S, Khan H, Madhumati G (2016) Wireless secured data transmission using cryptographic techniques through fpga. International Journal of Engineering and Technology (IJET), e-ISSN, 0975–4024

  37. 37.

    Singh H, Chugh K, Dhaka H, Verma A (2010) Dna based cryptography: an approach to secure mobile networks. DNA 1(19):77–80

    Google Scholar 

  38. 38.

    UbaidurRahman NH, Balamurugan C, Mariappan R (2015) A novel dna computing based encryption and decryption algorithm. Procedia Computer Science 46:463–475

    Article  Google Scholar 

  39. 39.

    VijayaKumar P, Vijayalakshmi V, Zayaraz G (2013) Enhanced level of security using dna computing technique with hyperelliptic curve cryptography. Int J Netw Secur 4(1):1

    Google Scholar 

  40. 40.

    Wang X, Zhang Q (2009) Dna computing-based cryptography. In: Fourth international conference on bio-inspired computing, 2009. BIC-TA’09. IEEE, pp 1–3

  41. 41.

    Wu C, Lee W, Tsaur W, et al. (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723

    Article  Google Scholar 

  42. 42.

    Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542

    Article  Google Scholar 

  43. 43.

    Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Annals of Telecommunications 72(3-4):131–144

    Article  Google Scholar 

  44. 44.

    Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83–92

    Article  Google Scholar 

  45. 45.

    Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247–269

    Article  Google Scholar 

  46. 46.

    Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1):231–235

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Madhusudhan R.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Madhusudhan R, Shashidhara R A novel DNA based password authentication system for global roaming in resource-limited mobile environments. Multimed Tools Appl 79, 2185–2212 (2020). https://doi.org/10.1007/s11042-019-08349-8

Download citation

Keywords

  • Authentication
  • DNA cryptography
  • User anonymity
  • Global roaming
  • Security
  • Smart-card