Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
نویسندگان
چکیده
With the rapid development of wireless communication technologies, mobile networks will enable users to use personal mobile devices to access various network information services at anytime and anyplace. Recently, Lu et al. proposed a dynamic ID based mutual authentication and key agreement scheme using elliptic curve cryptography (ECC) which attempts to support better security properties and resists various well-known security attacks. However, we introduce some design flaws in Lu et al.’s scheme, such as server impersonation attacks by launching stolen-verifier attacks. Besides, their authentication scheme is unable to preserver user anonymity and the performance of authentication and key agreement phase is inefficiency. As a remedy, the main contribution of this study is to design an improved and efficient ECC-based authentication scheme with privacy protection. We analyze its security and performance, proving that our improved scheme not only prevents security weaknesses on Lu et al.’s scheme, but also enhances system efficiency such that it can be implemented to more electronic applications in mobile communication networks.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملEfficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks
Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mobile networks. For personal privacy, it becomes an important is...
متن کاملA novel remote user authentication and key agreement scheme for mobile client-server environment
Recently, many identity (ID)-based user authentication and key agreement schemes for mobile client-server environment were proposed. However, these schemes are subjected to an inherent design weakness, namely, the server knows all users’ private keys. Under this problem, these schemes cannot provide insider attack resistance or mutual authentication. Furthermore, some of these schemes cannot si...
متن کاملSecurity Weaknesses on a Mutual Authentication and Key Agreement Scheme in Global Mobile Networks
User mobility is a feature that raises many issues related to security. One of them is the disclosure of a mobile user's real identity during the authentication process, or the other procedures specific to global mobile networks (GLOMONET). Such disclosure allows an unauthorized third-party to track the mobile user's movements and current whereabouts. In this article, we address some problems o...
متن کاملSecurity Enhancements of a Remote User Authentication Scheme Preserving User Anonymity
Recently, user authentication scheme in e-commerce and m-commerce has been becoming one of important security issues. In 2008, Bindu et al. proposed an improved remote user authentication scheme preserving user anonymity. In this paper, we analyze the security of Bindu et al.’s authentication scheme, and we demonstrate that their scheme is still insecure against the man-in-themiddle attack, the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 34 شماره
صفحات -
تاریخ انتشار 2016