Advertisement

Wireless Personal Communications

, Volume 74, Issue 2, pp 601–614 | Cite as

Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network

  • Qi Xie
  • Bin Hu
  • Xiao Tan
  • Mengjie Bao
  • Xiuyuan Yu
Article

Abstract

Two-factor authentication scheme for roaming service in global mobility network enables the mobile user in possession of a password and a smart card to achieve mutual authentication and session key establishment with the foreign agent. In this paper, we first identify six properties of this type of schemes: (1) Anonymity and untraceability; (2) Robustness; (3) Authentication; (4) Session key security and fairness; (5) User friendliness; and (6) Efficiency, then propose a new scheme which satisfies all these requirements. Our result is validated applying the formal verification tool ProVerif based on applied pi calculus.

Keywords

Authentication Roaming Anonymity Global mobility network 

Notes

Acknowledgments

This research was supported by the National Natural Science Foundation of China (No. 61070153), the Major State Basic Research Development (973) Program of China (No. 2013CB834205), and Natural Science Foundation of Zhejiang Province (No. LZ12F02005).

References

  1. 1.
    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230–234.MathSciNetGoogle Scholar
  2. 2.
    Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRefGoogle Scholar
  3. 3.
    Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.CrossRefGoogle Scholar
  4. 4.
    Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611–618.CrossRefGoogle Scholar
  5. 5.
    Youn, T. Y., Park, Y. H., & Li, M. J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communicaions Letters, 13(7), 1118–1123.Google Scholar
  6. 6.
    He, D., Chan, S., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.Google Scholar
  7. 7.
    Jiang, Q., Ma, J., Li, G., & Yang, L. (2012). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications. doi:  10.1007/s11277-012-0535-4.
  8. 8.
    Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1–2), 214–222.CrossRefMATHMathSciNetGoogle Scholar
  9. 9.
    Xu, J., Zhou, W. T., & Feng, D. G. (2011). An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34, 319–325.CrossRefGoogle Scholar
  10. 10.
    He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34, 367–374.CrossRefGoogle Scholar
  11. 11.
    Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNetGoogle Scholar
  12. 12.
    Chen, Y. C., Chuang, S. C., Yeh, L. Y., & Huang, J. L. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366–1375.CrossRefGoogle Scholar
  13. 13.
    Chen, C., He, D., Chan, S., Bu, J., Gao, Y., & Fan, R. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24, 347–362.CrossRefGoogle Scholar
  14. 14.
    Abadi, M., Blanchet, B., & Lundh, H. C. (2009). Models and proofs of protocol security: A progress report. In 21st International conference on computer aided verification (pp. 35–49), Grenoble, France.Google Scholar
  15. 15.
    Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on principles of programming languages (pp. 104–115). New York: ACM.Google Scholar
  16. 16.
    Dolev, D., & Yao, A. C. (1983). On the security of public-key protocols. IEEE Transaction on Information Theory, 2(29), 198–208.CrossRefMathSciNetGoogle Scholar
  17. 17.
    Abadi, M., & Blanchet, B. (2003). Computer-assisted verification of a protocol for certified email. In Proceedings of the 10th international symposium on static analysis, LNCS (vol. 2694, pp. 316–335). Berlin: Springer.Google Scholar
  18. 18.
    Abadi, M., Blanchet, B., & Fournet, C. (2004). Just fast keying in the Pi calculus. In Proceedings of the 13th European symposium on programming, LNCS (vol. 2986, pp. 340–354). Berlin: Springer.Google Scholar
  19. 19.
    Bai, G., Meng, G., Lei, J., Venkatraman, S. S., Saxena, P., Sun, J., et al. (2013). AuthScan: Automatic extraction of Web authentication protocols from implementations. In Proceedings of the 20th annual network and distributed system security symposium. http://www.comp.nus.edu.sg/~prateeks/papers/AuthScan.pdf.
  20. 20.

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Qi Xie
    • 1
  • Bin Hu
    • 1
  • Xiao Tan
    • 2
  • Mengjie Bao
    • 1
  • Xiuyuan Yu
    • 1
  1. 1.Hangzhou Key Laboratory of Cryptography and Network SecurityHangzhou Normal UniversityHangzhouChina
  2. 2.Department of Computer ScienceCity University of Hong Kong Kowloon, Hong KongChina

Personalised recommendations