A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks

  • Vanga Odelu
  • Sherali Zeadally
  • Ashok Kumar Das
  • Mohammad Wazid
  • Debiao He


The rapid proliferation of mobile networks has made security an important issue, particularly for transaction oriented applications. Recently, Jo et al. presented an efficient authentication protocol for wireless mobile networks and asserted that their proposed approach provides all known security functionalities including session key (SK) security under the assumption of the widely-accepted Canetti–Krawczyk (CK) model. We reviewed Jo et al.’s proposed roaming protocol and we demonstrate that it fails to provide the SK-security under the CK-adversary setting. We then propose an enhancement to Jo et al.’s roaming protocol to address the security drawback found in Jo et al.’s protocol. In the enhanced roaming protocol, we achieve the SK-security along with reduced computation, communication and storage costs. We also simulate the enhanced roaming protocol using NS2 for end-to-end delay and network throughput, and the simulation results obtained demonstrate the efficiency of our protocol.


Privacy Security Authentication Performance Secure roaming 



We thank the anonymous reviewers and the Editor for their valuable comments which helped us to improve the quality and presentation of the paper.


  1. 1.
    Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.CrossRefGoogle Scholar
  2. 2.
    Fatemi, M., Salimi, S., & Salahi, A. (2010). Anonymous roaming in universal mobile telecommunication system mobile networks. IET Information Security, 4(2), 93–103.CrossRefGoogle Scholar
  3. 3.
    Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRefGoogle Scholar
  4. 4.
    Yang, G., Wong, D. S., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 3461–3472.CrossRefGoogle Scholar
  5. 5.
    Lee, T. F., & Hwang, T. (2011). Provably secure and efficient authentication techniques for the global mobility network. Journal of Systems and Software, 84(10), 1717–1725.CrossRefGoogle Scholar
  6. 6.
    Zhu, H., Lin, X., Shi, M., Ho, P. H., & Shen, X. (2009). PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks. IEEE Transactions on Vehicular Technology, 58(5), 2529–2543.CrossRefGoogle Scholar
  7. 7.
    Chang, C. C., & Tsai, H. C. (2010). An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. IEEE Transactions on Wireless Communications, 9(11), 3346–3353.CrossRefGoogle Scholar
  8. 8.
    Shi, M., Rutagemwa, H., Shen, X., Mark, J. W., & Saleh, A. (2007). A service-agent-based roaming architecture for WLAN/cellular integrated networks. IEEE Transactions on Vehicular Technology, 56(5), 3168–3181.CrossRefGoogle Scholar
  9. 9.
    Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 11953–1966.CrossRefGoogle Scholar
  10. 10.
    Chen, C., He, D., Chan, S., Bu, J., Gao, Y., & Fan, R. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24(3), 347–362.CrossRefGoogle Scholar
  11. 11.
    Zhu, H., Pan, W., Liu, B., & Li, H. (2012). A lightweight anonymous authentication scheme for VANET based on bilinear pairing. In Proceedings of the 4th international conference on intelligent networking and collaborative systems (INCoS’12) (pp. 222–228). Bucharest: IEEE.Google Scholar
  12. 12.
    Tseng, Y., Huang, S., Tsai, T., & Ke, J. (2016). List-free ID-based mutual authentication and key agreement protocol for multi-server architectures. IEEE Transactions on Emerging Topics in Computing, 4(1), 102–112.CrossRefGoogle Scholar
  13. 13.
    Chang, C. C., & Lee, C. Y. (2012). A secure single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Electronics, 59(1), 629–637.CrossRefGoogle Scholar
  14. 14.
    Wang, G., Yu, J., & Xie, Q. (2013). Security analysis of a single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Informatics, 9(1), 294–302.CrossRefGoogle Scholar
  15. 15.
    Odelu, V., Das, A. K., & Goswami, A. (2015). A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks, 8(9), 1732–1751.CrossRefGoogle Scholar
  16. 16.
    Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9(1), 168–174.CrossRefGoogle Scholar
  17. 17.
    He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431–436.CrossRefGoogle Scholar
  18. 18.
    Nakanishi, T., & Funabiki, N. (2005). Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In Advances in cryptology (ASIACRYPT’05) (pp. 533–548). Chennai: Springer.Google Scholar
  19. 19.
    He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRefGoogle Scholar
  20. 20.
    He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRefGoogle Scholar
  21. 21.
    Han, Q., Zhang, Y., Chen, X., Li, H., & Quan, J. (2012) Efficient and robust identity-based handoff authentication in wireless networks. In Proceedings of the international conference on network and system security (NSS’12) (pp. 180–191). Fujian: Springer.Google Scholar
  22. 22.
    Shen, A. N., Guo, S., Zeng, D., & Guizani, M. (2012) A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In Proceedings of the of IEEE wireless communications and networking conference (WCNC’12) (pp. 2543–2548). Paris: IEEE.Google Scholar
  23. 23.
    Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J., & Kim, K. (2014). Identity-based chameleon hashing and signatures without key exposure. Information Sciences, 265, 198–210.CrossRefGoogle Scholar
  24. 24.
    Javanmardi, S., Shojafar, M., Shariatmadari, S., & Ahrabi, S. S. (2014). FR trust: A fuzzy reputation-based model for trust management in semantic P2P grids. International Journal of Grid and Utility Computing, 6(1), 57–66.CrossRefGoogle Scholar
  25. 25.
    Naranjo, P. G. V., Pooranian, Z., Shojafar, M., Conti, M., & Buyya, R. (2017). Focan: A fog-supported smart city network architecture for management of applications in the internet of everything environments. arXiv preprint arXiv:1710.01801.
  26. 26.
    Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Proceedings of advances in cryptology (ASIACRYPT’05) (pp. 515–532). Chennai: Springer.Google Scholar
  27. 27.
    Tsai, J. L., & Lo, N. W. (2016). Provably secure anonymous authentication with batch verification for mobile roaming services. Ad Hoc Networks, 44, 19–31.CrossRefGoogle Scholar
  28. 28.
    Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. In Advances in cryptology (EUROCRYPT’01) (pp. 453–474). Innsbruck, Tyrol: Springer.Google Scholar
  29. 29.
    Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.CrossRefGoogle Scholar
  30. 30.
    Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1(1), 36–63.CrossRefGoogle Scholar
  31. 31.
    Bellare, M., Canetti, R., & Krawczyk, H. (1998). A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the thirtieth annual ACM symposium on theory of computing (STOC’98) (pp. 419–428), Dallas, TX: ACM.Google Scholar
  32. 32.
    The Network Simulator-ns-2. Accessed on September 2015.
  33. 33.
    Wazid, M., Das, A. K., Kumar, N., & Rodrigues, J. P. C. (2017). Secure three-factor user authentication scheme for renewable energy based smart grid environment. IEEE Transactions on Industrial Informatics, 13(6), 3144–3153.CrossRefGoogle Scholar
  34. 34.
    Challa, S., Wazid, M., Das, A. K., Kumar, N., Goutham Reddy, A., Yoon, E. J., et al. (2017). Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access, 5, 3028–3043.CrossRefGoogle Scholar
  35. 35.
    Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Proceedings of second IEEE workshop on mobile computing systems and applications (WMCSA’99) (pp. 90–100). New Orleans, LA.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringIndian Institute of Information Technology, Sri CityChittoorIndia
  2. 2.College of Communication and InformationUniversity of KentuckyLexingtonUSA
  3. 3.Center for Security, Theory and Algorithmic ResearchInternational Institute of Information TechnologyHyderabadIndia
  4. 4.Cyber Security and Networks LabInnopolis UniversityInnopolisRussia
  5. 5.School of Mathematics and StatisticsWuhan UniversityWuhanChina

Personalised recommendations