On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks

被引:7
|
作者
Shashidhara, R. [1 ]
Nayak, Sanjeet Kumar [1 ]
Das, Ashok Kumar [2 ]
Park, Youngho [3 ,4 ]
机构
[1] Bennett Univ, Dept Comp Sci Engn, Greater Noida 201310, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
[4] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authentication; Security; Protocols; Roaming; Password; Cryptography; Wireless sensor networks; Global roaming; authentication; key establishment; cryptanalysis; security; BAN logic; AVISPA;
D O I
10.1109/ACCESS.2021.3050402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks. Recently, an efficient authentication system for global roaming has been proposed in the literature. In this article, we first show that the analyzed authentication system is vulnerable man-in-the-middle attack, replay attack and Denial-of-Service (DoS) attack, and it does not ensure untraceability and local password-verification process to identify wrong passwords. To fix these security flaws, we propose a more efficient and robust authentication system for roaming in mobility networks. We use the formal verification tools like ProVerif, Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham (BAN) logic to check the regularity of the authentication protocol. Moreover, we prove the secrecy of a session key through the formal security using the random oracle model, known as Real-Or-Random (ROR) model. Finally, a detailed performance evaluation proves that the security protocol not only provides a security strength, but also preserves the low computational overhead. Thus, the proposed authentication protocol is secure and computationally efficient as compared to other relevant schemes.
引用
收藏
页码:12879 / 12895
页数:17
相关论文
共 50 条
  • [31] EFFICIENT MUTUAL AUTHENTICATION AND KEY AGREEMENT WITH USER ANONYMITY FOR ROAMING SERVICES IN GLOBAL MOBILITY NETWORKS
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6415 - 6427
  • [32] Robust and secure authentication protocol protecting privacy for roaming mobile user in global mobility networks
    Madhusudhan, R.
    Suvidha, K. S.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (01) : 94 - 111
  • [33] Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network
    Sadhukhan, Dipanwita
    Ray, Sangram
    Dasgupta, Mou
    Khan, Muhammad Khurram
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 224
  • [34] A Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Network
    Wu, Kuo-Yang
    Chuang, Yo-Hsuan
    Wu, Tzong-Chen
    Lo, Nai-Wei
    2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING, INTELLIGENT SYSTEM AND INFORMATION TECHNOLOGY (ICSIIT), 2017, : 150 - 154
  • [35] An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Khan, Muhammad Khurram
    Das, Ashok Kumar
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (3-4) : 131 - 144
  • [36] Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks
    Gope, Prosanta
    Hwang, Tzonelih
    IEEE SYSTEMS JOURNAL, 2016, 10 (04): : 1370 - 1379
  • [37] An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Muhammad Khurram Khan
    Ashok Kumar Das
    Annals of Telecommunications, 2017, 72 : 131 - 144
  • [38] Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
    He, Daojing
    Chan, Sammy
    Chen, Chun
    Bu, Jiajun
    Fan, Rong
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (02) : 465 - 476
  • [39] Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
    Daojing He
    Sammy Chan
    Chun Chen
    Jiajun Bu
    Rong Fan
    Wireless Personal Communications, 2011, 61 : 465 - 476
  • [40] Lightweight Blockchain-Enabled Secure Data Sharing in Dynamic and Resource-Limited UAV Networks
    Liu, Yang
    Gao, Jiaqi
    Lu, Yueming
    Cao, Ruohan
    Yao, Linyuan
    Xia, Yuanqing
    Han, Daoqi
    IEEE NETWORK, 2024, 38 (04): : 25 - 31