Skip to main content
Log in

A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The authentication system plays a crucial role in the context of GLObal MObility NETwork (GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service over multiple Foreign Agents (FA). However, designing a robust and anonymous authentication protocol along with a user privacy is essential and challenging task. Due to the resource constrained property of mobile terminals, the broadcast nature of a wireless channel, mobility environments are frequently exposed to several attacks. Many researchers focus their interests on designing an efficient and secure mobile user authentication protocol for mobility networks. Very recently (in 2018), Xu et al presented the novel anonymous authentication system for roaming in GLOMONET, and insisted that their protocol is more secure than existing authentication protocols. The security strength of Xu et al.’s authentication protocol is analysed and identified that the protocol is vulnerable to stolen verifier attack, privileged insider attack, impersonation attack and denial of service attack. In-fact, the protocol suffers from clock synchronization problem and cannot afford local password-verification to detect wrong passwords quickly. As a remedy, we proposed an efficient and robust anonymous authentication protocol for mobility networks. The proposed mobile user authentication protocol achieves the provable security and has the ability to resist against numerous network attacks. Besides, the correctness of the novel authentication protocol is validated using formal security tool called AVISPA (Automated Validation of Internet Security Protocols & Applications). Finally, the performance analysis and simulation results reveals that the proposed authentication protocol is computationally efficient and practically implementable in resource limited mobility environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pres Commun 84(3):2055–2078

    Article  Google Scholar 

  2. Gope P, Hwang T (2016) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 10(4):1370–1379

    Article  Google Scholar 

  3. Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83–92

    Article  Google Scholar 

  4. Madhusudhan R, Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in glomonet. Peer Peer Netw Appl 1–22

  5. Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235

    Article  Google Scholar 

  6. Lee C, Hwang M, Liao E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687

    Article  Google Scholar 

  7. Wu C, Lee W, Tsaur W, et al. (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723

    Article  Google Scholar 

  8. Yoon E, Yoo K (2011) Young, Ha, K.: A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364

    Article  Google Scholar 

  9. Li C, Lee C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44

    Article  MathSciNet  Google Scholar 

  10. He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374

    Article  Google Scholar 

  11. Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371

    Article  Google Scholar 

  12. Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pres Commun 68(4):1477–1491

    Article  Google Scholar 

  13. Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004

    Article  Google Scholar 

  14. Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pres Commun 78(1):247–269

    Article  Google Scholar 

  15. Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222

    Article  MathSciNet  Google Scholar 

  16. Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527–3542

    Article  Google Scholar 

  17. Al Amiri W, Baza M, Mahmoud M, Alasmary W, Akkaya K Towards secure smart parking system using blockchain technology

  18. Amiri WA, Baza M, Banawan K, Mahmoud M, Alasmary W, Akkaya K (2019). Privacy-preserving smart parking system using blockchain and private information retrieval. arXiv:1904.09703

  19. Baza M, Nabil M, Ismail M, Mahmoud M, Serpedin E, Rahman M (2018). Blockchain-based charging coordination mechanism for smart grid energy storage units. arXiv:1811.02001

  20. Baza M, Nabil M, Lasla N, Fidan K, Mahmoud M, Abdallah M (2019) Blockchain-based firmware update scheme tailored for autonomous vehicles. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–7

  21. Zhang R, Xue R, Liu L (2019). Security and privacy on blockchain. arXiv:1903.07602

  22. Baza M, Nabil M, Bewermeier N, Fidan K, Mahmoud M, Abdallah M (2019). Detecting sybil attacks using proofs of work and location in vanets. arXiv:1904.05845

  23. Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8

    Article  Google Scholar 

  24. Guo D, Wen F (2016) A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw Secur 18(2):217–223

    Google Scholar 

  25. Madhusudhan R, et al. (2016) An effcient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security. ACM, pp 119–126

  26. Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann Telecommun 72(3–4):131–144

    Article  Google Scholar 

  27. Bojjagani S, Sastry V (2017) A secure end-to-end sms-based mobile banking protocol. Int J Commun Syst 30(15):3302

    Article  Google Scholar 

  28. Bojjagani S, Sastry V A secure end-to-end proximity nfc-based mobile payment protocol. Comput Stand Inter 66

  29. Karuppiah M, Kumari S, Li X, Wu F, Das AK, Khan MK, Saravanan R, Basu S (2017) A dynamic idbased generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel Pres Commun 93(2):383–407

    Article  Google Scholar 

  30. Arshad H, Rasoolzadegan A (2017) A secure authentication and key agreement scheme for roaming service with user anonymity. Int J Commun Syst

  31. Madhusudhan R, Shashidhara R (2019) A novel dna based password authentication system for global roaming in resource-limited mobile environments. Multimed Tool Appl 1–28

  32. Madhusudhan R, Shashidhara R (2019) A secure anonymous authentication protocol for roaming service in resource-constrained mobility environments. Arab J Sci Eng 1–22

  33. Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. Int J Secur Appl 9(10):297–312

    Google Scholar 

  34. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology—CRYPTO’99. Springer, pp 388–397

  35. Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secur Comput 12(4):428–442

    Article  Google Scholar 

  36. Madhusudhan R, et al. (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inform Secur Appl 38:96–110

    Google Scholar 

  37. Armando A, Basin D, Cuellar J, Rusinowitch M, Viganó L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64

  38. Reddy AG, Das AK, Yoon E-J, Yoo K-Y (2016) A secure anonymous authentication protocol for mobile ser vices on elliptic curve cryptography. IEEE Access 4:4394–4407

    Article  Google Scholar 

  39. Odelu V, Das AK, Kumari S, Huang X, Wazid M (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener Comput Syst 68:74–88

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saru Kumari.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shashidhara, R., Bojjagani, S., Maurya, A.K. et al. A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 13, 1943–1966 (2020). https://doi.org/10.1007/s12083-020-00929-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00929-y

Keywords

Navigation