当前位置: X-MOL 学术J. Inf. Secur. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A provably secure ECC-based roaming authentication scheme for global mobility networks
Journal of Information Security and Applications ( IF 3.8 ) Pub Date : 2020-08-18 , DOI: 10.1016/j.jisa.2020.102588
Mahdi Nikooghadam , Haleh Amintoosi , Saru Kumari

The advent of Internet of Things have paved the way for providing smart services for mobile users in the smart city. Due to the rapid movement of users and their fast information exchange, the global mobility network (GLOMONET) is a proper candidate to be used as the communication platform to provide roaming services. However, privacy and security preservation of mobile users becomes an important issue due to the open and public nature of communication channels. To address this issue, many roaming authentication schemes have been recently proposed. In this article, we first review the work presented by Ghahramani et al., and demonstrate its weaknesses. We then propose a provably secure and efficient authentication and key agreement scheme for roaming users in GLOMONETs in the smart city. To evaluate the performance of the proposed scheme, we first perform a comprehensive descriptive discussion on security preservation and utilise the widely accepted Scyther tool. We then consider the computational complexity and communication overhead of the proposed scheme, and compare it with the recent related work. The results demonstrate the outperformance of the proposed scheme in terms of very low computation and communication overhead as well as resistance against well-known security attacks.



中文翻译:

适用于全球移动网络的可证明安全的基于ECC的漫游认证方案

物联网的出现为智能城市中的移动用户提供智能服务铺平了道路。由于用户的快速移动和他们快速的信息交换,全球移动网络(GLOMONET)是合适的候选者,可以用作提供漫游服务的通信平台。但是,由于通信渠道的开放性和公共性,移动用户的隐私和安全保护成为一个重要的问题。为了解决这个问题,最近已经提出了许多漫游认证方案。在本文中,我们首先回顾Ghahramani等人提出的工作,并论证其缺点。然后,我们为智能城市中GLOMONETs中的漫游用户提出了一种可证明安全有效的身份验证和密钥协议方案。为了评估所提议方案的性能,我们首先对安全保护进行全面的描述性讨论,并利用广为接受的Scyther工具。然后,我们考虑所提出方案的计算复杂度和通信开销,并将其与最近的相关工作进行比较。结果表明,在非常低的计算和通信开销以及对众所周知的安全攻击的抵抗性方面,该方案的性能优于其他方案。

更新日期:2020-08-18
down
wechat
bug