Abstract
Two-factor authentication scheme for roaming service in global mobility network enables the mobile user in possession of a password and a smart card to achieve mutual authentication and session key establishment with the foreign agent. In this paper, we first identify six properties of this type of schemes: (1) Anonymity and untraceability; (2) Robustness; (3) Authentication; (4) Session key security and fairness; (5) User friendliness; and (6) Efficiency, then propose a new scheme which satisfies all these requirements. Our result is validated applying the formal verification tool ProVerif based on applied pi calculus.

Similar content being viewed by others
References
Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230–234.
Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.
Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.
Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611–618.
Youn, T. Y., Park, Y. H., & Li, M. J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communicaions Letters, 13(7), 1118–1123.
He, D., Chan, S., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.
Jiang, Q., Ma, J., Li, G., & Yang, L. (2012). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications. doi: 10.1007/s11277-012-0535-4.
Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1–2), 214–222.
Xu, J., Zhou, W. T., & Feng, D. G. (2011). An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34, 319–325.
He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34, 367–374.
Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.
Chen, Y. C., Chuang, S. C., Yeh, L. Y., & Huang, J. L. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366–1375.
Chen, C., He, D., Chan, S., Bu, J., Gao, Y., & Fan, R. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24, 347–362.
Abadi, M., Blanchet, B., & Lundh, H. C. (2009). Models and proofs of protocol security: A progress report. In 21st International conference on computer aided verification (pp. 35–49), Grenoble, France.
Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on principles of programming languages (pp. 104–115). New York: ACM.
Dolev, D., & Yao, A. C. (1983). On the security of public-key protocols. IEEE Transaction on Information Theory, 2(29), 198–208.
Abadi, M., & Blanchet, B. (2003). Computer-assisted verification of a protocol for certified email. In Proceedings of the 10th international symposium on static analysis, LNCS (vol. 2694, pp. 316–335). Berlin: Springer.
Abadi, M., Blanchet, B., & Fournet, C. (2004). Just fast keying in the Pi calculus. In Proceedings of the 13th European symposium on programming, LNCS (vol. 2986, pp. 340–354). Berlin: Springer.
Bai, G., Meng, G., Lei, J., Venkatraman, S. S., Saxena, P., Sun, J., et al. (2013). AuthScan: Automatic extraction of Web authentication protocols from implementations. In Proceedings of the 20th annual network and distributed system security symposium. http://www.comp.nus.edu.sg/~prateeks/papers/AuthScan.pdf.
Acknowledgments
This research was supported by the National Natural Science Foundation of China (No. 61070153), the Major State Basic Research Development (973) Program of China (No. 2013CB834205), and Natural Science Foundation of Zhejiang Province (No. LZ12F02005).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xie, Q., Hu, B., Tan, X. et al. Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Wireless Pers Commun 74, 601–614 (2014). https://doi.org/10.1007/s11277-013-1309-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-013-1309-3