A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
نویسندگان
چکیده
Mobile user authentication and key agreement for wireless networks is an important security priority. In recent years, several user authentication and key agreement protocols with smart cards for wireless communications have been proposed. In 2011, Xu et al. proposed an efficient mutual authentication and key agreement protocol with an anonymity property. Although the protocol of Xu et al. has many benefits, we find that it still suffers from several weaknesses which have been previously overlooked. In this paper, we propose a secure and efficient mutual authentication and key agreement protocol. Confidentiality of the session key and updating of the password efficiently are presented as the main contributions of this paper. Finally, evaluations of our proposed protocol show that our protocol can withstand various known types of attacks, and also satisfies essential functionality requirements. Additionally, efficiency analyses show that our protocol is simple and cost-efficient.
منابع مشابه
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications
Mobile users can roam into foreign networks and transmit messages to foreign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless communications are becoming more and more important. In recent years, most of the existing user authentication and key-agreement protocols with smart cards ...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملAn Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate use...
متن کاملAn Efficient User Authentication Scheme with Smart Cards for Wireless Communications
Since 2004, several user authentication schemes purpose to provide user anonymity in wireless communication have been announced, however, many of them failed to provide user anonymity, actually. In 2011, Li and Lee proposed a secure user authentication scheme for wireless communications. Differently from the previous researches, Li and Lee claimed two more session keys to enhance entire securit...
متن کاملAn Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 20 شماره
صفحات -
تاریخ انتشار 2018