A Robust User Authentication Protocol with Anonymity, Deniability, Key Agreement and Efficiency
نویسندگان
چکیده
An authentication protocol allows on-line service providers to validate the identity or legitimacy of a logging user. Once passing the verification, an authorized user can obtain useful and valuable resource or services from the service provider through Internet conveniently. However, most the current authentication protocols cannot protect user’s privacy perfectly. To improve this deficiency, we proposed a robust and efficient authentication protocol attempting to preserve user’s privacy entirely and also provide the following properties: i) user anonymity, ii) deniability, iii) key agreement, and iv) efficiency. Moreover, our proposed protocol is non-interactive, which is achieved by reducing the number of message exchanges between users and service provider upon performing the authentication activity. Hence, our proposed protocol is more suitable for current wireless mobile network environments due to only need message exchange once avoiding the channel error rate. Moreover, analysis showed that our proposed protocol can withstand various known kinds of attacks.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملA WTLS Handshake Protocol with User Anonymity and Forward Secrecy
Forward secrecy and user anonymity are provided in the WTLS for the wireless Internet communications. Forward secrecy can be built by using Diffie-Hellman key agreement with random numbers in the Hello messages, and user anonymity by employing the signcryption scheme to the ClientKeyExchange and CertificateVerify procedure. In addition to these features, the modified WTLS handshake protocol has...
متن کاملSecurity and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
With the rapid development of wireless communication technologies, mobile networks will enable users to use personal mobile devices to access various network information services at anytime and anyplace. Recently, Lu et al. proposed a dynamic ID based mutual authentication and key agreement scheme using elliptic curve cryptography (ECC) which attempts to support better security properties and r...
متن کاملWireless Authentication Protocol Preserving User Anonymity
We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile environments. When a mobile user and his visited network mutually authenticate each other, the anonymity of the user should be preserved. In order to provide user anonymity, we introduce new method of computing the temporary identity (TID) during the authentication process....
متن کاملA Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user’s login process. Recently, Yang et al., proposed an efficient user identification and key distribution protocol while preserving user anonymity. Their protocol addresses a weakness in the protocol proposed by Wu and Hsu. Unfortunately, Yang’s protocol poses a vulnerability that...
متن کامل