Abstract
Ubiquitous networks enable mobile users to communicate with each other efficiently and independently without the need of inventing agent. This approach is proved to be delay and spectral efficient. Due to the nature of underlying Big data, such networks are prone to several security and privacy challenges. Because such gigantic data is not only difficult to store, maintain and manipulate but Big data’s open architecture makes the security threats inevitable. Therefore, incorporating authentication between mobile node and foreign network during roaming in ubiquitous networks has become a tedious task. Very recently, Farash et al. found a number of weaknesses in the schemes proposed by Wen et al. and Shin et al. Furthermore, Farash et al. proposed an enhanced scheme for roaming user in ubiquitous network. However, after thorough investigation, we show fragilities of Farash et al.’s scheme against (1) mobile user anonymity violation; (2) disclosure of secret parameter of mobile node; (3) session key disclosure; and (4) mobile node impersonation attacks. Therefore, we propose an improved scheme to fix these fragilities. We analyze the security of proposed scheme using popular automated verification tool ProVerif. The analysis confirms that the proposed scheme resists the known attacks while having quite low overhead as compared with Farash et al.’s scheme. Therefore, in order to get better performance proposed scheme is a suitable candidate to be employed along with supercomputing systems for dealing the security challenges of big data in ubiquitous networks.



Similar content being viewed by others
References
Victor, N., Lopez, D., Abawajy, J.H.: Privacy models for big data: a survey. Int. J. Big Data Intell. 3(1), 61–75 (2016)
Xing, W., Jie, W., Tsoumakos, D., Ghanem, M.: A network approach for managing and processing big cancer data in clouds. Clust. Comput. 18(3), 1285–1294 (2015). doi:10.1007/s10586-015-0456-6
Shah, T., Rabhi, F., Ray, P.: Investigating an ontology-based approach for big data analysis of inter-dependent medical and oral health conditions. Clust. Comput. 18(1), 351–367 (2015). doi:10.1007/s10586-014-0406-8
Wang, Y., Liu, Z., Liao, H., Li, C.: Improving the performance of gis polygon overlay computation with mapreduce for spatial big data processing. Clust. Comput. 18(2), 507–516 (2015). doi:10.1007/s10586-015-0428-x
Suzuki, S., Nakada, K.: An authentication technique based on distributed security management for the global mobility network. IEEE J. Sel. Areas Commun. 15(8), 1608–1617 (1997)
Yeh, C.-K., Lee, W.-B.: An overall cost-effective authentication technique for the global mobility network. IJ Netw. Secur. 9(3), 227–232 (2009)
Seo, D., Jeon, Y.-B., Lee, S.-H., Lee, K.-H.: Cloud computing for ubiquitous computing on m2m and iot environment mobile application. Clust. Comput. 19(2), 1001–1013 (2016). doi:10.1007/s10586-016-0573-x
Zhu, H., Liu, T., Wei, G., Li, H.: Ppas: privacy protection authentication scheme for vanet. Clust. Comput. 16(4), 873–886 (2013). doi:10.1007/s10586-013-0260-0
Zhang, W., Zhang, Y., Chen, J., Li, H., Wang, Y.: End-to-end security scheme for machine type communication based on generic authentication architecture. Clust. Comput. 16(4), 861–871 (2013). doi:10.1007/s10586-013-0259-6
Lin, L., Liu, T., Hu, J., Ni, J.: Pqsel: combining privacy with quality of service in cloud service selection. Int. J. Big Data Intell. 3(3), 202–214 (2016)
Murugaiyan, S., Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: A generic privacy breach preventing methodology for cloud based web service. Stand. Stand., 426 (2015)
Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electron. 50(1), 231–235 (2004)
Lee, C.-C., Hwang, M.-S., Liao, I.-E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Indus. Electron. 53(5), 1683–1687 (2006)
Wu, C.-C., Lee, W.-B., Tsaur, W.-J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10), 722–723 (2008)
Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1), 214–222 (2012)
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12), 2803–2814 (2008)
Li, C.-T., Lee, C.-C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1), 35–44 (2012)
Chen, Y.-C., Chuang, S.-C., Yeh, L.-Y., Huang, J.-L.: A practical authentication protocol with anonymity for wireless access networks. Wirel. Commun. Mob. Comput. 11(10), 1366–1375 (2011)
Chen, C., He, D., Chan, S., Bu, J., Gao, Y., Fan, R.: Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3), 347–362 (2011)
Xie, Q., Hu, B., Tan, X., Bao, M., Yu, X.: Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wirel. Pers. Commun. 74(2), 601–614 (2014)
He, D., Chan, S., Chen, C., Bu, J., Fan, R.: Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 61(2), 465–476 (2011)
Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477–1491 (2013)
Wen, F., Susilo, W., Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993–1004 (2013)
Shin, S., Yeh, H., Kim, K.: An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw. Appl. 8(4), 674–683 (2015). doi:10.1007/s12083-013-0218-2
Farash, M.S., Chaudhry, S.A., Heydari, M., Sadough, S., Mohammad, S., Kumari, S., Khan, M.K.: A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4), e3019 (2017). doi:10.1002/dac.3019
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.: On the power of power analysis in the real world: a complete break of the keeloq code hopping scheme. In: Wagner D. (ed.) Advances in Cryptology, CRYPTO 2008. Lecture Notes in Computer Science, vol. 5157, pp. 203–220. Springer, Berlin (2008). doi:10.1007/978-3-540-85174-5_12
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983). doi:10.1109/TIT.1983.1056650
Kumari, S., Khan, M.K., Li, X., Wu, F.: Design of a user anonymous password authentication scheme without smart card. Int. J. Commun. Syst. 29(3), 441–458 (2016). doi:10.1002/dac.2853
Kumari, S., Li, X., Wu, F., Das, A.K., Odelu, V., Khan, M.K.: A user anonymous mutual authentication protocol. KSII Trans. Internet Inf. Syst. 10(9) (2016)
He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. (2016). doi:10.1109/JSYST.2016.2544805
He, D., Kumar, N., Shen, H., Lee, J.-H.: One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 59(5), 052108 (2016). doi:10.1007/s11432-015-5469-5
Kumari, S., Li, X., Wu, F., Das, A.K., Arshad, H., Khan, M.K.: A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comput. Syst. 63, 56–75 (2016)
Chaudhry, S.A., Farash, M.S., Naqvi, H., Islam, S.H., Shon, T.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun., 1–25 (2015). doi:10.1007/s11277-015-3139-y
Kumari, S., Chaudhry, S.A., Wu, F., Li, X., Farash, M.S., Khan, M.K.: An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl., 1–15 (2015). doi:10.1007/s12083-015-0409-0
Kilinc, H., Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005–1023 (2014). doi:10.1109/SURV.2013.091513.00050
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chaudhry, S.A., Albeshri, A., Xiong, N. et al. A privacy preserving authentication scheme for roaming in ubiquitous networks. Cluster Comput 20, 1223–1236 (2017). https://doi.org/10.1007/s10586-017-0783-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-0783-x