A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
- PDF / 3,873,719 Bytes
- 24 Pages / 595.224 x 790.955 pts Page_size
- 53 Downloads / 194 Views
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments R. Shashidhara1 · Sriramulu Bojjagani2 · Anup Kumar Maurya3 · Saru Kumari4
· Hu Xiong5
Received: 19 August 2019 / Accepted: 8 May 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract The authentication system plays a crucial role in the context of GLObal MObility NETwork (GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service over multiple Foreign Agents (FA). However, designing a robust and anonymous authentication protocol along with a user privacy is essential and challenging task. Due to the resource constrained property of mobile terminals, the broadcast nature of a wireless channel, mobility environments are frequently exposed to several attacks. Many researchers focus their interests on designing an efficient and secure mobile user authentication protocol for mobility networks. Very recently (in 2018), Xu et al presented the novel anonymous authentication system for roaming in GLOMONET, and insisted that their protocol is more secure than existing authentication protocols. The security strength of Xu et al.’s authentication protocol is analysed and identified that the protocol is vulnerable to stolen verifier attack, privileged insider attack, impersonation attack and denial of service attack. In-fact, the protocol suffers from clock synchronization problem and cannot afford local password-verification to detect wrong passwords quickly. As a remedy, we proposed an efficient and robust anonymous authentication protocol for mobility networks. The proposed mobile user authentication protocol achieves the provable security and has the ability to resist against numerous network attacks. Besides, the correctness of the novel authentication protocol is validated using formal security tool called AVISPA (Automated Validation of Internet Security Protocols & Applications). Finally, the performance analysis and simulation results reveals that the proposed authentication protocol is computationally efficient and practically implementable in resource limited mobility environments. Keywords Authentication · Global roaming · Mobile networks · Privacy · User anonymity · Computationally efficient
1 Introduction With the tremendous growth of communication technologies enabled mobile users to roam across the world in order to access ubiquitous services offered by the mobile network [1]. In recent times, GLOMONET becomes one of the emerging environments to provide seamless roaming service in foreign networks. But it is well-known that the wireless and mobility environment is more prone to attacks. The adversary can eavesdrop, modify, or block the sensitive information communicated through the radio link. Accordingly, mutual authentication process between communication entities in the mobility environment is crucial. Saru Kumari
[email protected]
Extended author information available on the last page of the article.
A general authentication scenario
Data Loading...