Advertisement

A Mobile User Authentication Technique in Global Mobility Network

  • Sudip Kumar PalitEmail author
  • Mohuya Chakraborty
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1065)

Abstract

Anonymous user authentication always is a paramount job in global mobility network (GLOMONET). In GLOMONET, a mobile user can move from one place to another place causes changes of mobile network from one to another. As authentication server can authenticate only its registered users, it cannot verify other mobile users. Furthermore, in global mobility network, communication channel is public. An adversary of the network can get access of all transmitted messages over the channel. In such a situation, several network security attacks can be initiated by an adversary to decrypt the messages. Therefore, mobile users as well as network provider’s information may come in risk. A robust anonymous user authentication and key agreement technique required to ensure the protection of such information. Several authentication protocols have been designed in GLOMONET in recent years. Unfortunately, most of them are unprotected against various network security attacks. Therefore, in this paper, we proposed a rigid authentication protocol in GLOMONET to overcome all the deficiencies of the previous work. Performance analysis of our protocol shows that it is reliable and even more effective compared to other existing protocols.

Keywords

Global mobility network Authentication Network security AVISPA 

References

  1. 1.
    Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10), 722–723 (2008)CrossRefGoogle Scholar
  2. 2.
    Zeng, P., Cao, Z., Choo, K.-K. R., Wang, S.: On the anonymity of some authentication schemes for wireless communication. IEEE Commun. Lett. 13(3), March 2009CrossRefGoogle Scholar
  3. 3.
    Chang, C.-C., Lee, C.-Y., Chiu, Y.-C.: Enhanced authentication scheme with anonymity for roaming service in Global Mobility network. Comput. Commun. 32(4), 611–618 (2009)CrossRefGoogle Scholar
  4. 4.
    Zhou, T., Xu, J.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205–213 (2011)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1–2), 214–222 (2012)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Hsieh, W.B., Leu, J.S.: Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wireless Commun. Mob. Comput. 14, 995–1006 (2014). June 2012 in Wiley  https://doi.org/10.1002/wcm.2252CrossRefGoogle Scholar
  7. 7.
    Kim, J., Kwak, J.: Improved secure anonymous authentication scheme for roaming service in global mobile network. Int. J. Security Appl. 6(3), 45–54 (2012)Google Scholar
  8. 8.
    Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wireless Pers. Commun. 68(4), 1477–1491 (2013)CrossRefGoogle Scholar
  9. 9.
    Lee, T.-F.: User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks. Commun. Netw. 6(11), 1404–1413 (2013)CrossRefGoogle Scholar
  10. 10.
    He, D., Zhang, Y., Chen, J.: Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Pers. Commun. 74(2), 229–243 (2014)CrossRefGoogle Scholar
  11. 11.
    Wen, F., Susilo, W., Yang, G.: A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun. 73(3), 993–1004 (2013)CrossRefGoogle Scholar
  12. 12.
    Zhao, D., Peng, H., Li, L., Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun. 78, 247 (2014).  https://doi.org/10.1007/s11277-014-1750-yCrossRefGoogle Scholar
  13. 13.
    Kuo, W.-C., Wei, H.-J., Cheng, J.-C.: An efficient and secure anonymous mobility network authentication scheme. J. Inf. Secur. Appl. 19, 18–24 (2014)CrossRefGoogle Scholar
  14. 14.
    Gope, P., Hwang, T.: Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wireless Pers. Commun. 82, 2231 (2015).  https://doi.org/10.1007/s11277-015-2344-zCrossRefGoogle Scholar
  15. 15.
    Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), December 2016CrossRefGoogle Scholar
  16. 16.
    Karuppiah, M., Kumari, S., Das, A.K., Li, X., Wu, F., Basu, S.: A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Netw. 9(17), 4192–4209 (2016)CrossRefGoogle Scholar
  17. 17.
    Gope, P., Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62, 1–8 (2016)Google Scholar
  18. 18.
    Xu, L., Wu, F.: A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks. Secur. Commun. Netw. 9(16), 3428–3443 (2016)CrossRefGoogle Scholar
  19. 19.
    Arshad, H., Rasoolzadegan, A.: A secure authentication and key agreement scheme for roaming service with user anonymity. Int. J. Commun. Syst. 30(18), e3361 (2017)CrossRefGoogle Scholar
  20. 20.
    Madhusudhan, R., Suvidha, K.S.: An efficient and secure user authentication scheme with anonymity in global mobility networks. In: Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 19–24, Mar 2017Google Scholar
  21. 21.
    Lee, C.-C., Lai, Y.-M., Chen, C.-T., Chen, S.-D.: Advanced secure anonymous authentication scheme for roaming service in global mobility network. Wireless Pers. Commun. 94(3), 1281–1296 (2017)CrossRefGoogle Scholar
  22. 22.
    Park, K., Park, Y., Park, Y., Reddy, A.G., Das, A.K.: Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access.  https://doi.org/10.1109/access.2017.2773535CrossRefGoogle Scholar
  23. 23.
    Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference, Santa Barbara, CA, USA, pp. 388–397, August 1999Google Scholar
  24. 24.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552, May 2002MathSciNetCrossRefGoogle Scholar
  25. 25.
    AVISPA. Automated Validation of Internet Security Protocols and Applications. Available: http://www.avispa-project.org/
  26. 26.
    von Oheimb, D.: The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proceedings of the 3rd APPSEM, Frauenchiemsee, Germany, pp. 1–17 (2005)Google Scholar
  27. 27.
    AVISPA. SPAN, The Security Protocol Animator for AVISPA. Available: http://www.avispa-project.org
  28. 28.
    Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., Kumar, N., Park, Y., Tanwar, S.: Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access 6, 20673–20693 (2018).  https://doi.org/10.1109/ACCESS.2018.2827027CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.University of Engineering and ManagementKolkataIndia
  2. 2.Institute of Engineering and ManagementKolkataIndia

Personalised recommendations