Skip to main content
Log in

Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Past few years, the mobile technology and location based services have experienced a great increment in number of its users. The privacy issues related to these services are becoming main concerns because of the leakage of users’ private information and contents. To prevent revelation of private information, many researchers have proposed several secure and authentication schemes which apply various technologies to provide integral security properties, such as symmetric encryption, digital signature, timestamp, etc. Unfortunately, some of these schemes still exhibit security and efficiency issues. In this research paper, we proposed an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme over the wireless system was attempted missing some system detail. We also proposed the prevent user private information and secure communication by asymmetric cryptography scheme. We solved the wireless communication problem in A3 algorithm such as eavesdropping and this problem solved by asymmetric cryptography scheme because of its robustness against this type of attack by providing mutual authentication make the system more secure. Finally, performance and cost analysis show our scheme is more suitable for low-power and resource limited wireless system and thus availability for real implementation. According to our security analysis and performance, we can prove that our proposed asymmetric cryptography scheme is able to improve wireless communication system security and enhance efficiency in comparison to previous schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Driessen, B., Hund, R., Willems, C., Paar, C., & Holz, T. (2013). An experimental security analysis of two satphone standards. Transactions on Information and System Security (TISSEC), 16(3), 1–30. http://doi.acm.org/10.1145/2535522.

  2. Lin, C.-Y., & Hung, M.-T. (2014). A location-based personal task reminder for mobile users. Personal and Ubiquitous Computing, 18(2), 303–314.

  3. Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless Personal Communication. doi:10.1007/s11277-014-1878-9

  4. Hoseini-Tabatabaei, S. A., Gluhak, A., & Tafazolli, R. (2013). A survey on smartphone-based systems for opportunistic user context recognition. Computing Surveys (CSUR), 45(3), 1–51. http://doi.acm.org/10.1145/2480741.2480744.

  5. Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2010). Security and trust of public key cryptography options for HIP. In IEEE 10th international conference on computer and information technology (CIT), 2010 (pp. 1079–1084). IEEE.

  6. Seo, S. H., Won, J., & Bertino, E. (2014). POSTER: A pairing-free certificate less hybrid sign-cryption scheme for advanced metering infrastructures. In Proceedings of the 4th ACM conference on data and application security and privacy (pp. 143–146). ACM.

  7. Islam, S. H., & Biswas, G. (2012). Certificateless strong designated verifier multisignature scheme using bilinear pairings. In Proceedings of the international conference on advances in computing, communications and informatics (pp. 540–546). ACM.

  8. Wu, X., Xu, L., & Zhang, X. (2011). Poster: A certificateless proxy re-encryption scheme for cloud-based data sharing. In Proceedings of the 18th ACM conference on computer and communications security (pp. 869–872). ACM.

  9. Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-certificate public key cryptography and Certificateless signature/encryption scheme in the standard model. In Proceedings of the 2nd ACM symposium on information, computer and communications security, (pp. 273–283). ACM.

  10. Cho, J.-H., Chan, K. S., & Chen, I.-R. (2013). Composite trust-based public keymanagement inmobile ad hoc networks. In Proceedings of the 28th annual ACM symposium on applied computing, (pp. 1949–1956). ACM.

  11. Meyer, U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on wireless security (pp. 90–97). ACM.

  12. Hasan, M. R., Abdallah, S., Raja, A. (2014). Topology aware convention emergence. In AAMAS ‘14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems

  13. Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key. Wireless Personal Communication. doi:10.1007/s11277-014-1879-8

  14. Hanaoka, G. (2013). On the properties of public key encryption from group signatures. In Proceedings of the first ACM workshop on Asia public-key cryptography (pp. 1–2). ACM.

  15. Nagy, M., & Kotuliak, I. (2013). DEnhancing security in mobile data networks through end user and core network cooperation. In MoMM ‘13: Proceedings of international conference on advances in mobile computing and multimedia. ACM.

  16. Nicanfar, H., TalebiFard, P., Hosseininezhad, S., Leung, V., & Damm, M. (2013). Security and privacy of electric vehicles in the smart grid context: problem and solution. In Proceedings of the third ACM international symposium on design and analysis of intelligent vehicular networks and applications (pp. 45–54). ACM.

  17. Otto, M. (2012). Highly acyclic groups, hypergraph covers, and the guarded fragment. Journal of the ACM (JACM), 59(1), 5.

    Article  Google Scholar 

  18. Al-Riyami, S., & Paterson, K. (2003) Certificateless public key cryptography. In Advances in Cryptology-Asiacrypt’2003, Lecture Notes in Computer Science (vol. 2894, pp. 452–473). Springer.

  19. Akhtar, R., Leng, S., Memon, I., Ali, M., Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communication. doi:10.1007/s11277-014-1996-4

  20. Li, J., Huang, X., Mu, Y., Susilo, W., & Wu, Q. (2007). Certificate-based signature: Security model and efficient construction. In EuroPKI 2007 (pp. 110–125). http://dx.doi.org/10.1007/978-3-540-73408-6_8.

  21. Cho, J.-H., Chan, K. S., Chen, I.-R. (2013). Composite trust-based public key management in mobile ad hoc networks. In SAC ‘13: Proceedings of the 28th annual ACM symposium on applied computing.

  22. Höller, A., Druml, N., Kreiner, C., Steger, C., Felicijan, T. (2014). Hardware/software co-design of elliptic-curve cryptography for resource-constrained applications. In DAC ‘14: Proceedings of the the 51st annual design automation conference on design automation conference.

  23. Ghinita, G., & Rughinis, R. (2014). A privacy-preserving location-based alert system. In SIGSPATIAL’13: Proceedings of the 21st ACM SIGSPATIAL international conference on advances in geographic information systems.

  24. Antão, S., & Sousa, L. (2013). The CRNS framework and its application to programmable and reconfigurable cryptography. Transactions on Architecture and Code Optimization (TACO), 9(4)

  25. Kiayias, A., & Tang, Q. (2013). How to keep a secret: Leakage deterring public-key cryptosystems. In CCS ‘13: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security (pp. 943–954). http://doi.acm.org/10.1145/2508859.2516691.

  26. Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.

    Article  Google Scholar 

  27. Kuo, W. C., Wei, H. J., & Cheng, J. C. (2014). An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications, Available online 13, March 2014.

  28. Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78, 247–269. doi:10.1007/s11277-014-1750-y.

    Article  Google Scholar 

  29. Xie, Q., Hu, B., Bao, B., & Yu, X. (2013). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74(2), 601–614.

    Article  Google Scholar 

  30. Wei, Jianghong, Liu, Wenfen, & Xuexian, Hu. (2014). Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 77, 2255–2269. doi:10.1007/s11277-014-1636-z.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imran Memon.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Memon, I., Hussain, I., Akhtar, R. et al. Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Pers Commun 84, 1487–1508 (2015). https://doi.org/10.1007/s11277-015-2699-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2699-1

Keywords

Navigation