Abstract
Mobile environments are highly vulnerable to security threats and pose a great challenge for the wireless and mobile networks being used today. Because the mode of a wireless channel is open, these networks do not carry any inherent security and hence are more prone to attacks. Therefore, designing a secure and robust protocol for authentication in a global mobile network is always a challenging. In these networks, it is crucial to provide authentication to establish a secure communication between the Mobile User (MU), Foreign Agent (FA) and Home Agent (HA). In order to secure communication among these entities, a number of authentication protocols have been proposed. The main security flaw of the existing authentication protocols is that attackers have the ability to impersonate a legal user at any time. Moreover, the existing authentication protocols in the literature are exposed to various kind of cryptographic attacks. Besides, the authentication protocols require larger key length and more computation overhead. To remedy these weaknesses in mobility networks, DNA (Deoxyribo Nucleic Acid) based authentication scheme using Hyper Elliptic Curve Cryptosystem (HECC) is introduced. It offers greater security and allows an MU, FA and HA to establish a secure communication channel, in order to exchange the sensitive information over the radio link. The proposed system derive benefit from HECC, which is smaller in terms of key size, more computational efficiency. In addition, the security strength of this authentication system is validated through widely accepted security verification tool called ProVerif. Further, the performance analysis shows that the DNA based authentication system using HECC is secure and practically implementable in the resource-constrained mobility nodes.
This is a preview of subscription content, access via your institution.















References
- 1.
Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: a progress report. In: Computer aided verification. Springer, pp 35–49
- 2.
Adleman LM (1998) Computing with dna. Scientific American 279(8):34–41
- 3.
Ahmed K, El-Henawy I (2017) Increasing robustness of data encryption standard by integrating dna cryptography. Int J Comput Appl 39(2):91–105
- 4.
Arshad H, Rasoolzadegan A (2017) A secure authentication and key agreement scheme for roaming service with user anonymity. International Journal of Communication Systems
- 5.
Chang C, Lee C, Chiu Y (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618
- 6.
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory 22(6):644–654
- 7.
ElGamal T (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology. Springer, pp 10–18
- 8.
Eom S, Huh J-H (2018) Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment. Journal of Ambient Intelligence and Humanized Computing, 1–11
- 9.
Ezziane Z (2005) Dna computing: applications and challenges. Nanotechnology 17(2):27
- 10.
Fadell A, Hodge A, Schell S, Caballero R, Dorogusker JL, Zadesky S, Sanford E (2015) Embedded authentication systems in an electronic device. Google Patents. US Patent 9,134,896
- 11.
Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379
- 12.
Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. Int J Secur Appl 9(10):297–312
- 13.
He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374
- 14.
Huh J-H (2017) Plc-based design of monitoring system for ict-integrated vertical fish farm. Human-centric Computing and Information Sciences 7(1):20
- 15.
Huh J-H, Kim T-J (2019) A location-based mobile health care facility search system for senior citizens. The Journal of Supercomputing 75(4):1831–1848
- 16.
Jemimah J, Muthumeenakshi K, Radha S (2018) Web based biometric validation using biological identities: an elaborate survey. In: 2018 fourth international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB). IEEE, pp 1–6
- 17.
Jeon W, Lee Y, Won D (2013) An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications 7(4):1–5
- 18.
Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491
- 19.
Karuppiah M, Kumari S, Li X, Wu F, Das AK, Khan MK, Saravanan R, Basu S (2017) A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 93 (2):383–407
- 20.
Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84 (3):2055–2078
- 21.
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209
- 22.
Koblitz N (1990) A family of jacobians suitable for discrete log cryptosystems. In: Proceedings on advances in cryptology. Springer, New York, pp 94–99
- 23.
Kumari S, Khan MK (2014) More secure smart card-based remote user password authentication scheme with user anonymity. Secur Commun Netw 7(11):2039–2053
- 24.
Kuo W, Wei H, Cheng C (2014) An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications 19 (1):18–24
- 25.
Lai X, Lu M, Qin L, Han J, Fang X (2010) Asymmetric encryption and signature method with dna technology. Sci China Inf Sci 53(3):506–514
- 26.
Lee C, Hwang M, Liao E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5):1683–1687
- 27.
Lee C-C, Lai Y, Chen C, Chen S-D (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications: An International Journal 94(3):1281–1296
- 28.
Madhusudhan R, et al. (2016) An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security. ACM, pp 119–126
- 29.
Madhusudhan R, et al. (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110
- 30.
Madhusudhan R, Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in glomonet. Peer-to-Peer Networking and Applications, 1–22
- 31.
Miller V (1986) Use of elliptic curves in cryptography. In: Advances in cryptology—CRYPTO’85 Proceedings. Springer, pp 417–426
- 32.
Misbahuddin M, Sreeja C (2015) A secure image-based authentication scheme employing dna crypto and steganography. In: Proceedings of the third international symposium on women in computing and informatics. ACM, pp 595–601
- 33.
Mun H, Han K, Lee Y, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222
- 34.
Pelzl J, Wollinger T, Guajardo J, Paar C (2003) Hyperelliptic curve cryptosystems: closing the performance gap to elliptic curves. In: CHES. Springer, pp 351–365
- 35.
Raju P, Parwekar P (2015) Dna encryption based dual server password authentication. In: Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA) 2014. Springer, pp 29–37
- 36.
Rao IRSN, Krishna BM, Shameem S, Khan H, Madhumati G (2016) Wireless secured data transmission using cryptographic techniques through fpga. International Journal of Engineering and Technology (IJET), e-ISSN, 0975–4024
- 37.
Singh H, Chugh K, Dhaka H, Verma A (2010) Dna based cryptography: an approach to secure mobile networks. DNA 1(19):77–80
- 38.
UbaidurRahman NH, Balamurugan C, Mariappan R (2015) A novel dna computing based encryption and decryption algorithm. Procedia Computer Science 46:463–475
- 39.
VijayaKumar P, Vijayalakshmi V, Zayaraz G (2013) Enhanced level of security using dna computing technique with hyperelliptic curve cryptography. Int J Netw Secur 4(1):1
- 40.
Wang X, Zhang Q (2009) Dna computing-based cryptography. In: Fourth international conference on bio-inspired computing, 2009. BIC-TA’09. IEEE, pp 1–3
- 41.
Wu C, Lee W, Tsaur W, et al. (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
- 42.
Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542
- 43.
Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Annals of Telecommunications 72(3-4):131–144
- 44.
Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83–92
- 45.
Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247–269
- 46.
Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1):231–235
Author information
Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Madhusudhan R, Shashidhara R A novel DNA based password authentication system for global roaming in resource-limited mobile environments. Multimed Tools Appl 79, 2185–2212 (2020). https://doi.org/10.1007/s11042-019-08349-8
Received:
Revised:
Accepted:
Published:
Issue Date:
Keywords
- Authentication
- DNA cryptography
- User anonymity
- Global roaming
- Security
- Smart-card