On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks

被引:7
|
作者
Shashidhara, R. [1 ]
Nayak, Sanjeet Kumar [1 ]
Das, Ashok Kumar [2 ]
Park, Youngho [3 ,4 ]
机构
[1] Bennett Univ, Dept Comp Sci Engn, Greater Noida 201310, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
[4] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authentication; Security; Protocols; Roaming; Password; Cryptography; Wireless sensor networks; Global roaming; authentication; key establishment; cryptanalysis; security; BAN logic; AVISPA;
D O I
10.1109/ACCESS.2021.3050402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks. Recently, an efficient authentication system for global roaming has been proposed in the literature. In this article, we first show that the analyzed authentication system is vulnerable man-in-the-middle attack, replay attack and Denial-of-Service (DoS) attack, and it does not ensure untraceability and local password-verification process to identify wrong passwords. To fix these security flaws, we propose a more efficient and robust authentication system for roaming in mobility networks. We use the formal verification tools like ProVerif, Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham (BAN) logic to check the regularity of the authentication protocol. Moreover, we prove the secrecy of a session key through the formal security using the random oracle model, known as Real-Or-Random (ROR) model. Finally, a detailed performance evaluation proves that the security protocol not only provides a security strength, but also preserves the low computational overhead. Thus, the proposed authentication protocol is secure and computationally efficient as compared to other relevant schemes.
引用
收藏
页码:12879 / 12895
页数:17
相关论文
共 50 条
  • [21] Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks
    Indushree, M.
    Raj, Manish
    Mishra, Vipul Kumar
    Shashidhara, R.
    Das, Ashok Kumar
    Bhat, K. Vivekananda
    COMPUTER COMMUNICATIONS, 2023, 200 : 1 - 16
  • [22] Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks
    Nyangaresi, Vincent Omollo
    Yenurkar, Ganesh Keshaorao
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (02):
  • [23] A secure mutual authentication protocol for roaming in wireless mesh networks
    Xiao, P. (xp1984@emails.bjut.edu.cn), 1600, Academy Publisher (07):
  • [24] A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks
    Wen, Fengtong
    Susilo, Willy
    Yang, Guomin
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (03) : 993 - 1004
  • [25] A provably secure ECC-based roaming authentication scheme for global mobility networks
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    Kumari, Saru
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54 (54)
  • [26] A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks
    Fengtong Wen
    Willy Susilo
    Guomin Yang
    Wireless Personal Communications, 2013, 73 : 993 - 1004
  • [27] Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks
    Kuo, Wen-Chung
    Wei, Hong-Ji
    Cheng, Jiin-Chiou
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (02): : 151 - 156
  • [28] An Authentication Framework for Roaming Service in Global Mobility Networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    Guleria, Vandana
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (01): : 129 - 145
  • [29] A secure lightweight two-factor authentication scheme in global mobility networks
    Madhusudhan, R.
    Suvidha, K. S.
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2019, 9 (02) : 109 - 123
  • [30] A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
    Baig, Ahmed Fraz
    ul Hassan, Khwaja Mansoor
    Ghani, Anwar
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Ashraf, Muhammad Usman
    PLOS ONE, 2018, 13 (04):