On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks

被引:7
|
作者
Shashidhara, R. [1 ]
Nayak, Sanjeet Kumar [1 ]
Das, Ashok Kumar [2 ]
Park, Youngho [3 ,4 ]
机构
[1] Bennett Univ, Dept Comp Sci Engn, Greater Noida 201310, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
[4] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authentication; Security; Protocols; Roaming; Password; Cryptography; Wireless sensor networks; Global roaming; authentication; key establishment; cryptanalysis; security; BAN logic; AVISPA;
D O I
10.1109/ACCESS.2021.3050402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks. Recently, an efficient authentication system for global roaming has been proposed in the literature. In this article, we first show that the analyzed authentication system is vulnerable man-in-the-middle attack, replay attack and Denial-of-Service (DoS) attack, and it does not ensure untraceability and local password-verification process to identify wrong passwords. To fix these security flaws, we propose a more efficient and robust authentication system for roaming in mobility networks. We use the formal verification tools like ProVerif, Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham (BAN) logic to check the regularity of the authentication protocol. Moreover, we prove the secrecy of a session key through the formal security using the random oracle model, known as Real-Or-Random (ROR) model. Finally, a detailed performance evaluation proves that the security protocol not only provides a security strength, but also preserves the low computational overhead. Thus, the proposed authentication protocol is secure and computationally efficient as compared to other relevant schemes.
引用
收藏
页码:12879 / 12895
页数:17
相关论文
共 50 条