Abstract
Authentication plays a pivotal role for mobile users to provide security and privacy to their personal information while availing the roaming service in Global Mobility Network (GLOMONET). Most of the schemes offered to address authentication-related problems are built on the centralized semi-trusted server. In such type of server, the privacy and the security of mobile users may be compromised. To eradicate such a problem, here, we propose a user authentication scheme known as AUGChain for GLOMONET. The novelty of the work lies in proposing a scheme, to produce a peer-to-peer network, where each participant can directly interact with the information stored in the secure distributed ledger. Therefore, in this proposed scheme, the unnecessary forward of requisite data by a participant is reduced. Hence, not only minimization of communicational overhead is achieved, but also it minimizes the computational time of the whole scheme. The blockchain technology-based implementation is carried out on hyperledger composer along with hyperledger fabric. The security analysis of the proposed scheme has been done using Burrows–Abadi–Needham logic to ensure mutual authentication between the participants. Moreover, the proposed model, AUGChain, outperforms the other existing schemes by resisting different network security attacks like compromised server attacks, DOS, DDOS attacks, reducing communicational costs as well as computational time a significant amount. This has been done by reducing the execution time of the order of 7.5 ms.
Similar content being viewed by others
References
Refaey A, Hammad K, Magierowski S, Hossain E (2020) A blockchain policy and charging control framework for roaming in cellular networks. IEEE Netw 34(3):170–177
Nayak S, Singh A, Vora J, Marchi L, Thomas M, Alexander M, Prasad S, Mangla U (2020) Blockchain for telecom roaming, fraud user identification, and overage management. https://developer.ibm.com/technologies/blockchain/patterns/blockchain-for-telecom-roaming-fraud-and-overage-management/ Accessed 28 Apr, 2020
Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 232(50):231–235
Wu C, Lee W, Tsaur W (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
Zeng P, Cao Z, Choo K, Wang S (2009) On the anonymity of some authentication schemes for wireless communication. IEEE Commun Lett 13(3):170–171
Zhou T, Xu J (2011) Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput Netw 55(1):205–213
Mun H, Han K, Lee Y, Yeun C, Choi H (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222
Hsieh W, Leu J (2012) Anonymous authentication protocol based on elliptic curve diffiehellman for wireless access networks. Wirel Commun Mob Comput 14:995–1006
Kim J, Kwak J (2012) Improved secure anonymous authentication scheme for roaming service in global mobile network. Int J Secur Appl 6(3):45–54
Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wirel Pers Commun 68(4):1477–1491
He D, Zhang Y, Chen (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243
Wen F, Susilo W, Yang G (2013) A secure and effective user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(9):993–1004
Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78:247–269
Kuo W, Wei H, Cheng J (2014) An efficient and secure anonymous mobility network authentication scheme. J Inf Secur Appl 19:18–24
Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82:2231–2245
Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84:20552078
Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8
Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 94:1281–1296
Madhusudhan R, Suvidha KS (2017) An efficient and secure user authentication scheme with anonymity in global mobility networks. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp 19–24
Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125
Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118
Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465
Madhusudhan R, Shashidhara (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110
Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565
Sohail MM, Hassan M, Mansoor K, Ghani A, Jawad K (2020) An improved authentication protocol for global mobility network (GLOMONET). In: 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp 401–406
Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588
Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M (2021) AMAPG: advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271
Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441
Hojjati M, Shafieinejad A, Yanikomeroglu H (2020) A Blockchain-based authentication and key agreement (AKA) protocol for 5G networks. IEEE Access 8:216461–216476
Haddad Z, Fouda MM, Mahmoud M, Abdallah M (2020) Blockchain-based authentication for 5G networks. In: IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp 189–194
Hyperledger fabric retrieved from. http://www.hyperledger.org/use/fabric/. Accessed 20 May 2020
Hyperledger composer retrieved from. http://hyperledger.github.io/composer/latest/. Accessed 20 June 2020
Hyperledger playground retrieved from. https://hyperledger.github.io/composer/latest/playground/playground-index. Accessed 20 June 2020
Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A Math Phys Sci 426:233–271
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO-99, vol 68. Springer, Berlin, Heidelberg, pp 388–397
Messerges T, Dabbish E, Sloan R (2002) Examining smartcard security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Banerjee S, Odelu V, Das AK, Chattopadhyay S, Kumar N, Park Y, Tanwar S (2018) Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access 6:20673–20693
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Palit, S.K., Chakraborty, M. & Chakraborty, S. AUGChain: blockchain-based mobile user authentication scheme in global mobility network. J Supercomput 78, 6788–6816 (2022). https://doi.org/10.1007/s11227-021-04139-y
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04139-y