Improved Efficient Authentication Scheme with Anonymity in Global Mobility Networks

نویسنده

  • Chi-Tung Chen
چکیده

A number of user authentication schemes have been proposed to provide roaming services in the global mobility network (GLOMONET). However, most of these schemes are based on an asymmetric cryptosystem, which has a higher computational cost. To achieve computational efficiency, Chang et al. proposed an authentication scheme using simple hash functions for mobile devices in the GLOMONET. However, this study shows that the scheme by Chang et al. does not provide user anonymity and cannot counteract insider attacks, in addition to being vulnerable to the disclosure of session keys and foreign agent spoofing. Therefore, this study proposes a more secure and efficient authentication scheme and uses the Burrows-Abadi-Needham (BAN) logic method to verify the scheme. The proposed scheme can overcome the main disadvantages of the Chang et al. scheme and satisfy the crucial design criteria for a secure remote user authentication scheme. The proposed scheme can provide a more secure functionality and has superior performance, such as a lower computational cost, less time complexity, fewer communication rounds, fewer transmitted messages, and less energy consumption. For practical purposes, this study demonstrates that the proposed scheme can be used to enhance the effectiveness and efficiency of the authentication scheme in the GLOMONET.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mobile networks. For personal privacy, it becomes an important is...

متن کامل

Lightweight anonymous authentication scheme with unlinkability in global mobility networks

Anonymous user authentication schemes are essential to guarantee personal privacy in global mobility networks. Recently, Chung, Lee and Won proposed an improved authentication scheme with anonymity which remedies security weaknesses showed by Youn, Park and Lim. However, their improved scheme does not provide unlinkability. In this paper, we propose an anonymous authentication scheme which ensu...

متن کامل

A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks

Recently, Mun et al. analyzed Wu et al.’s authentication scheme and proposed a enhanced anonymous authentication scheme for roaming service in global mobility networks. However, through careful analysis, we find that Mun et al.’s scheme is vulnerable to impersonation attacks, off-line password guessing attacks and insider attacks, and cannot provide user friendliness, user’s anonymity, proper m...

متن کامل

An Improved Anonymous Authentication Scheme for Roaming Services

In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013