Skip to main content
Log in

A Secure and Privacy-Preserving Mutual Authentication System for Global Roaming in Mobile Networks

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Mutual authentication scheme plays a significant role in the global mobility network to afford roaming service. However, designing secure and privacy-preserving authentication protocols for roaming service is always challenging. Due to the nature of wireless communication medium, these networks are vulnerable to security threats. In recent times, some authentication systems have been proposed for the mobile user roaming in the mobility environments. Nevertheless, most of the security protocols are prone to security attacks. In this paper, a secure mutual authentication protocol is designed using lightweight cryptographic primitives. The protocol design includes initialization phase, registration phase, mutual authentication phase, and the password change phase to ensure the user anonymity, privacy, and security in global mobility networks. In addition, we used a popular formal verification tool called AVISPA (Automated Validation of Internet Security Protocols and Applications) to check the correctness of the proposed protocol. Notably, the formal security analysis has been carried out through BAN logic, which proves the security strength of the proposed framework. Finally, a performance analysis shows that the proposed authentication system preserves low computational and communication overheads.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Jiang, Q.; Ma, J.; Li, G.; Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477–1491 (2013)

    Article  Google Scholar 

  2. Suzuki, S.; Nakada, K.: An authentication technique based on distributed security management for the global mobility network. Sel. Areas Commun. IEEE J. 15(8), 1608–1617 (1997)

    Article  Google Scholar 

  3. Karuppiah, M.; Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)

    Article  Google Scholar 

  4. Ha, J.: An efficient and robust anonymous authentication scheme in global mobility networks. Int. J. Secur. Appl. 9(10), 297–312 (2015)

    Google Scholar 

  5. Li, C.; Lee, C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1), 35–44 (2012)

    Article  MathSciNet  Google Scholar 

  6. He, D.; Ma, M.; Zhang, Y.; Chen, C.; Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)

    Article  Google Scholar 

  7. Zhao, D.; Peng, H.; Li, L.; Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers Commun. 78(1), 247–269 (2014)

    Article  Google Scholar 

  8. Karuppiah, M.; Kumari, S.; Li, X.; Wu, F.; Das, A.K.; Khan, M.K.; Saravanan, R.; Basu, S.: A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 93(2), 383–407 (2017)

    Article  Google Scholar 

  9. Hao, Z.; Zhong, S.; Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)

    Article  Google Scholar 

  10. Wen, F.; Susilo, W.; Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993–1004 (2013)

    Article  Google Scholar 

  11. Wang, D.; He, D.; Wang, P.; Chu, C.-H.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Depend. Secure Comput. 12(4), 428–442 (2015)

    Article  Google Scholar 

  12. Madhusudhan, R., et al.: An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security, pp. 119–126 (2016). ACM

  13. Lee, C.; Hwang, M.; Liao, E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. Ind. Electron. IEEE Trans. 53(5), 1683–1687 (2006)

    Article  Google Scholar 

  14. Kang, D.; Jung, J.; Mun, J.; Lee, D.; Choi, Y.; Won, D.: Efficient and robust user authentication scheme that achieve user anonymity with a markov chain. Secur. Commun. Netw. 9(11), 1462–1476 (2016)

    Article  Google Scholar 

  15. Gope, P.; Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), 1370–1379 (2016)

    Article  Google Scholar 

  16. Wu, F.; Xu, L.; Kumari, S.; Li, X.; Das, A.K.; Khan, M.K.; Karuppiah, M.; Baliyan, R.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9(16), 3527–3542 (2016)

    Article  Google Scholar 

  17. Gope, P.; Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62, 1–8 (2016)

    Article  Google Scholar 

  18. Guo, D.; Wen, F.: A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw. Secur. 18(2), 217–223 (2016)

  19. Wu, F.; Xu, L.; Kumari, S.; Li, X.; Khan, M.K.; Das, A.K.: An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. Telecommun. 72(3–4), 131–144 (2017)

    Article  Google Scholar 

  20. Arshad, H., Rasoolzadegan, A.: A secure authentication and key agreement scheme for roaming service with user anonymity. Int. J. Commun. Syst. (2017)

  21. Wu, F.; Li, X.; Xu, L.; Kumari, S.; Sangaiah, A.K.: A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68, 107–118 (2018)

    Article  Google Scholar 

  22. Madhusudhan, R.; et al.: A secure and lightweight authentication scheme for roaming service in global mobile networks. J. Inform. Secur. Appl. 38, 96–110 (2018)

    Google Scholar 

  23. Lee, C.-C.; Lai, Y.; Chen, C.; Chen, S.-D.: Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. An Int. J. 94(3), 1281–1296 (2017)

    Article  Google Scholar 

  24. Shashidhara, R., Bojjagani, S., Maurya, A.K., Kumari, S., Xiong, H.: A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 1–24,(2020)

  25. Madhusudhan, R.; Shashidhara, R.: A novel dna based password authentication system for global roaming in resource-limited mobile environments. Multimedia Tools Appl. 79(3), 2185–2212 (2020)

    Article  Google Scholar 

  26. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—-CRYPTO’99, pp. 388–397 (1999). Springer

  27. Mun, H.; Han, K.; Lee, Y.S.; Yeun, C.Y.; Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1), 214–222 (2012)

    Article  MathSciNet  Google Scholar 

  28. Burrows, M., Abadi, M.: A logic of authentication. In: Proc. R. Soc. Lond. A, vol. 426, pp. 233–271 (1989). The Royal Society

  29. Armando, A., Basin, D., Cuellar, J., Rusinowitch, M., Viganò, L.: Avispa: automated validation of internet security protocols and applications. ERCIM News 64,(2006)

  30. Basin, D.; Mödersheim, S.; Vigano, L.: Ofmc: a symbolic model checker for security protocols. Int. J. Inform. Secur. 4(3), 181–208 (2005)

    Article  Google Scholar 

  31. Dolev, D.; Yao, A.: On the security of public key protocols. IEEE Trans. Inform. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  32. Glouche, Y., Genet, T., Heen, O., Courtay, O.: A security protocol animator tool for avispa. In: ARTIST2 workshop on security specification and verification of embedded systems, Pisa (2006)

  33. Dai, W.: Crypto++ library 5.1-a free c++ class library of cryptographic schemes. http://www.cryptopp.com/ (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Shashidhara.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shashidhara, R., Lajuvanthi, M. & Akhila, S. A Secure and Privacy-Preserving Mutual Authentication System for Global Roaming in Mobile Networks . Arab J Sci Eng 47, 1435–1446 (2022). https://doi.org/10.1007/s13369-021-05940-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-021-05940-w

Keywords

Navigation