http://iet.metastore.ingenta.com
1887

Lightweight authentication with key-agreement protocol for mobile network environment using smart cards

Lightweight authentication with key-agreement protocol for mobile network environment using smart cards

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In 2012, Mun et al. proposed an enhanced secure authentication with key-agreement protocol for roaming service in global mobility networks environment based on elliptic curve cryptography. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful analysis of this study proves that Mun et al.'s protocol is susceptible to several attacks such as replay attack, man-in-middle attack, user impersonation attack, privileged insider attack, denial-of-service attack, no login phase and imperfect mutual authentication phase. In addition, this study proposes an enhanced lightweight authentication with key-agreement protocol for mobile networks based on elliptic curve cryptography using smart cards. The proposed protocol is lightweight and perfectly suitable for real-time applications as it accomplishes simple one-way hash function, message authentication code and exclusive-OR operation. Furthermore, it achieves all the eminent security properties and is resistant to various possible attacks. The security analysis and comparison section demonstrates that the proposed protocol is robust compared with Mun et al.'s protocol.

References

    1. 1)
      • 1. Boyd, C., Mathuria, A.: ‘Protocols for authentication and key establishment’ (Springer Science & Business Media, 2013).
    2. 2)
      • 2. Cheng, Q.: ‘Security analysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks’, Int. J. Netw. Secur., 2015, 17, (4), pp. 494496.
    3. 3)
      • 3. Chang, C.-C., Lee, C.-Y., Chiu, Y.-C.: ‘Enhanced authentication scheme with anonymity for roaming service in global mobility networks’, Comput. Commun., 2009, 32, (4), pp. 611618.
    4. 4)
      • 4. Chen, C.-T., Lee, C.-C.: ‘A two-factor authentication scheme with anonymity for multi-server environments’, Secur. Commun. Netw., 2015, 8, (8), pp. 16081625.
    5. 5)
      • 5. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: ‘An efficient and practical solution to remote authentication: smart card’, Comput. Secur., 2002, 21, (4), pp. 372375.
    6. 6)
      • 6. Das, A.K.: ‘Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards’, IET Inf. Secur., 2011, 5, (3), pp. 145151.
    7. 7)
      • 7. He, D., Chen, J., Hu, J.: ‘An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security’, Inf. Fusion, 2012, 13, (3), pp. 223230.
    8. 8)
      • 8. Fan, C.-I., Lin, Y.-H.: ‘Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics’, IEEE Trans. Inf. Forensics Secur., 2009, 4, (4), pp. 933945.
    9. 9)
      • 9. Mitra, F., Salimi, S., Salahi, A.: ‘Anonymous roaming in universal mobile telecommunication system mobile networks’, IET Inf. Secur., 2010, 4, (2), pp. 93103.
    10. 10)
      • 10. He, D., Kumar, N., Khan, M.K., et al: ‘Anonymous two-factor authentication for consumer roaming service in global mobility networks’, IEEE Trans. Consum. Electron., 2013, 59, (4), pp. 811817.
    11. 11)
      • 11. Kim, J.-S., Kwak, J.: ‘Secure and efficient anonymous authentication scheme in global mobility networks’, J. Appl. Math., 2013, 2013, Article ID 3025, 12 pages, http://dx.doi.org/10.1155/2013/302582.
    12. 12)
      • 12. Lee, C.-C., Hwang, M.-S., Liao, I.-E.: ‘Security enhancement on a new authentication scheme with anonymity for wireless environments’, IEEE Trans. Ind. Electron., 2006, 53, (5), pp. 16831687.
    13. 13)
      • 13. Leu, J.-S., Hsieh, W.-B.: ‘Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards’, IET Inf. Secur., 2014, 8, (2), pp. 104113.
    14. 14)
      • 14. Li, C.-T., Hwang, M.-S.: ‘An efficient biometrics-based remote user authentication scheme using smart cards’, J. Netw. Comput. Appl., 2010, 33, (1), pp. 15.
    15. 15)
      • 15. Li, X., Xiong, Y., Ma, J., et al: ‘An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards’, J. Netw. Comput. Appl., 2012, 35, (2), pp. 763769.
    16. 16)
      • 16. Li, C.-T.: ‘A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card’, IET Inf. Secur., 2013, 7, (1), pp. 310.
    17. 17)
      • 17. Memon, I., Hussain, I., Akhtar, R., et al: ‘Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme’, Wirel. Pers. Commun., 2015, 84, (2), pp. 14871508.
    18. 18)
      • 18. Mun, H., Han, K., Lee, Y.S., et al: ‘Enhanced secure anonymous authentication scheme for roaming service in global mobility networks’, Math. Comput. Model., 2012, 55, (1), pp. 214222.
    19. 19)
      • 19. Odelu, V., Das, A.K., Goswami, A.: ‘A secure biometrics-based multi-server authentication protocol using smart cards’, IEEE Trans. Inf. Forensics Secur., 2015, 10, (9), pp. 19531966.
    20. 20)
      • 20. Wu, C.-C., Lee, W.-B., Tsaur, W.-J.: ‘A secure authentication scheme with anonymity for wireless communications’, IEEE Commun. Lett., 2008, 12, (10), pp. 722723.
    21. 21)
      • 21. Xue, K., Hong, P., Ma, C.: ‘A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture’, J. Comput. Syst. Sci., 2014, 80, (1), pp. 195206.
    22. 22)
      • 22. Yoon, E.-J., Yoo, K.-Y., Ha, K.-S.: ‘A user friendly authentication scheme with anonymity for wireless communications’, Comput. Electr. Eng., 2011, 37, (3), pp. 356364.
    23. 23)
      • 23. Zhang, L., Tang, S., Cai, Z.: ‘Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications’, IET Commun., 2014, 8, (1), pp. 8391.
    24. 24)
      • 24. Zhang, G., Fan, D., Zhang, Y., et al: ‘A privacy preserving authentication scheme for roaming services in global mobility networks’, Secur. Commun. Netw., 2015, 8, (16), pp. 28502859.
    25. 25)
      • 25. Zhao, D., Peng, H., Li, L., et al: ‘A secure and effective anonymous authentication scheme for roaming service in global mobility networks’, Wirel. Pers. Commun., 2014, 78, (1), pp. 247269.
    26. 26)
      • 26. Zhou, T., Xu, J.: ‘Provable secure authentication protocol with anonymity for roaming service in global mobility networks’, Comput. Netw., 2011, 55, (1), pp. 205213.
    27. 27)
      • 27. Zhu, J., Ma, J.: ‘A new authentication scheme with anonymity for wireless environments’, IEEE Trans. Consum. Electron., 2004, 50, (1), pp. 231235.
    28. 28)
      • 28. Lamport, L.: ‘Password authentication with insecure communication’, Commun. ACM, 1981, 24, (11), pp. 770772.
    29. 29)
      • 29. Kocher, P., Jaffe, J., Jun, B.: ‘Differential power analysis’. Advances in Cryptology – CRYPTO'99, 1999 (LNCS1666), pp. 388397.
    30. 30)
      • 30. Messerges, T.S., Dabbish, E., Sloan, R.H.: ‘Examining smart-card security under the threat of power analysis attacks’, IEEE Trans. Comput., 2002, 51, (5), pp. 541552.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0390
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0390
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address