Skip to main content
Log in

Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Traditional smart card and password based two-factor authentication schemes for roaming services in global mobility networks are based on public key or symmetric key cryptographic primitives. With the advancement of chaos-based cryptography, it has become an interesting topic to investigate if it can be used as an alternative tool for building mobile roaming authentication schemes that achieve higher efficiency and security. In this paper, we answer this question affirmatively by proposing a chaotic maps-based authentication scheme for roaming. The scheme supports authentication, security and strong anonymity using the applied pi calculus-based formal verification tool ProVerif. Besides, it applies the efficient Chebyshev polynomial computation for better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Xie, Q., Hu, B., Dong, N., & Wong, D. S. (2014). Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PLoS ONE, 7, e102747. doi:10.1371/journal.pone.0102747.

    Article  Google Scholar 

  2. He, D. (2012). An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10, 1009–1016.

    Article  Google Scholar 

  3. He, D., Chen, Y., & Chen, J. (2012). Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics, 69, 1149–1157.

    Article  MathSciNet  MATH  Google Scholar 

  4. Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9, 168–174.

    Article  Google Scholar 

  5. Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50, 230–234.

    Google Scholar 

  6. Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53, 1683–1687.

    Article  Google Scholar 

  7. Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12, 722–723.

    Article  Google Scholar 

  8. Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32, 611–618.

    Article  Google Scholar 

  9. Youn, T. Y., Park, Y. H., & Li, M. J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters, 13, 1118–1123.

    Google Scholar 

  10. He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34, 367–374.

    Article  Google Scholar 

  11. Li, C., & Lee, C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 5, 35–44.

    Article  MathSciNet  MATH  Google Scholar 

  12. Chen, C., He, D., Chan, S., Bu, J., Gao, Y., & Fan, R. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24, 347–362.

    Article  Google Scholar 

  13. Xu, J., Zhou, W. T., & Feng, D. G. (2011). An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34, 319–325.

    Article  Google Scholar 

  14. Yoon, E. J., Yoo, K. Y., & Ha, K. S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering, 3, 356–364.

    Article  Google Scholar 

  15. Chen, Y. C., Chuang, S. C., Yeh, L. Y., & Huang, J. L. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366–1375.

    Article  Google Scholar 

  16. Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68, 1477–1491.

    Article  Google Scholar 

  17. Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214–222.

    Article  MathSciNet  MATH  Google Scholar 

  18. Hsieh, W. B., & Leu, J. S. (2014). Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wireless Communications and Mobile Computing, 10, 995–1006.

    Article  Google Scholar 

  19. Xie, Q., Tan, X., Wong, D. S., Wang, G., Bao, M., & Dong, N. (2014). A practical anonymous authentication protocol for wireless roaming. Security and Communication Networks, 8, 1264–1273.

    Article  Google Scholar 

  20. He, D., Zhang, Y., & Chen, J. (2014). Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications, 74, 229–243.

    Article  Google Scholar 

  21. Xie, Q., Hu, B., Tan, X., Bao, M., & Yu, X. (2014). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74, 601–614.

    Article  Google Scholar 

  22. Zhang, L. (2008). Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals, 37, 669–674.

    Article  MathSciNet  MATH  Google Scholar 

  23. Guo, X., & Zhang, J. (2010). Secure group key agreement protocol based on chaotic Hash. Information Sciences, 180, 4069–4074.

    Article  MathSciNet  MATH  Google Scholar 

  24. Farash, M. S., & Attari, M. A. (2014). An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dynamics, 77, 399–411.

    Article  MathSciNet  MATH  Google Scholar 

  25. Tan, Z. (2013). A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dynamics, 72, 311–320.

    Article  MathSciNet  MATH  Google Scholar 

  26. Guo, C., & Chang, C. C. (2013). Chaotic maps-based password-authenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation, 18, 1433–1440.

    Article  MathSciNet  MATH  Google Scholar 

  27. Xie, Q., Zhao, J., & Yu, X. (2013). Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dynamics, 74, 1021–1027.

    Article  MathSciNet  MATH  Google Scholar 

  28. Blanchet, B. (2001). An efficient cryptographic protocol verifier based on prolog rules. In Proceedings of the 14th IEEE workshop on computer security foundations 2001 (pp. 82–96). Cape Breton: IEEE Computer Society.

  29. Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages 2001 (pp. 104–115). ACM.

  30. Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29, 198–208.

    Article  MathSciNet  MATH  Google Scholar 

  31. Xue, K., & Hong, P. (2012). Security improvement on an anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 17, 2969–2977.

    Article  MathSciNet  MATH  Google Scholar 

  32. Lee, J., & Chang, C. (2007). Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, 30, 1377–1396.

    Article  Google Scholar 

  33. Li, W. M., Wen, Q. Y., Su, Q., & Jin, Z. P. (2012). An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications, 35, 188–195.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Xie.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xie, Q., Hu, B., Tan, X. et al. Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks. Wireless Pers Commun 96, 5881–5896 (2017). https://doi.org/10.1007/s11277-017-4452-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4452-4

Keywords

Navigation