Skip to main content
Log in

Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In GLObal MObile NETwork (GLOMONET), it is essential to authenticate and provide secure communication between a user, foreign agent, and the home agent using session key. Designing a secure and efficient authentication protocol for roaming users in the mobile network is a challenging. In order to secure communication over an insecure channel, a number of authentication schemes have been proposed. The main weakness of the existing authentication protocols is that attackers have the ability to impersonate a legal user at any time. In addition, the existing protocols are vulnerable to various kind of cryptographic attacks such as insider attack, bit flipping attack, forgery attacks, denial-of-service attack, unfair key agreement and cannot provide user’s anonymity. To remedy these weaknesses and to achieve low communication and computation costs, we proposed a secure authentication scheme for roaming users. In addition, the formal verification tools ProVerif and AVISPA is used to check the correctness of the proposed protocol. Finally, the performance evaluation and simulation results shows that the proposed scheme is efficient in terms of communication and computational cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Lee C-C, Hwang M-S, Liao I-E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687

    Article  Google Scholar 

  2. Li C-T, Lee C-C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44

    Article  MathSciNet  MATH  Google Scholar 

  3. Ma C-G, Wang D, Zhao S-D (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215–2227

    Article  Google Scholar 

  4. Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82(4):2231–2245

    Article  Google Scholar 

  5. He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374

    Article  Google Scholar 

  6. Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491

    Article  Google Scholar 

  7. Suzuki S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617

    Article  Google Scholar 

  8. Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84(3):2055–2078

    Article  Google Scholar 

  9. Samfat D, Molva R, Asokan N (1995) Untraceability in mobile networks. In: Proceedings of the 1st annual international conference on mobile computing and networking, ACM, pp 26–36

  10. Ha J (2015) An efficient and robust anonymous authentication scheme in global mobility networks. International Journal of Security and Its Applications 9(10):297–312

    Article  Google Scholar 

  11. Yoon E-J, Yoo K-Y, Ha K-S (2011) A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364

    Article  Google Scholar 

  12. Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247–269

    Article  Google Scholar 

  13. Chang C-C, Lee C-Y, Chiu Y-C (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618

    Article  Google Scholar 

  14. Youn T-Y, Park Y-H, Lim J (2009) Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun Lett 13(7):471–473

    Article  Google Scholar 

  15. Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: A progress report. In: Computer aided verification,Springer, pp 35–49

    Chapter  Google Scholar 

  16. Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235

    Article  Google Scholar 

  17. Wu C-C, Lee W-B, Tsaur W-J, et al (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723

    Article  Google Scholar 

  18. Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004

    Article  Google Scholar 

  19. Mun H, Han K, Lee YS, Yeun CY, Choi HH (2012) Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 55(1):214–222

    Article  MathSciNet  MATH  Google Scholar 

  20. Gope P, Hwang T (2016) An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J Netw Comput Appl 62:1–8

    Article  Google Scholar 

  21. Guo D, Wen F (2016) A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw Secur 18(2):217–223

    Google Scholar 

  22. Madhusudhan R et al (2016) An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security, ACM, pp 119–126

  23. Wu F, Xu L, Kumari S, Li X, Khan MK, Das AK (2017) An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann Telecommun 72(3-4):131–144

    Article  Google Scholar 

  24. Madhusudhan R, et al (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. Journal of Information Security and Applications 38:96– 110

    Article  Google Scholar 

  25. Jeon W, Lee Y, Won D (2013) An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications 7(4):1–5

    Google Scholar 

  26. Kuo W-C, Wei H-J, Cheng J-C (2014) An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications 19(1):18–24

    Article  Google Scholar 

  27. Lee C-C, Lai Y, Chen C, Chen S-D (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun: An Int J 94(3):1281–1296

    Article  Google Scholar 

  28. Xu J, Zhu W-T, Feng D-G (2009) An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4):723–728

    Article  Google Scholar 

  29. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO’99, Springer, pp 388–397

  30. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Commun 51(5):541–552

    MathSciNet  MATH  Google Scholar 

  31. Xie Q, Hu B, Tan X, Wong DS (2017) Chaotic maps-based strong anonymous authentication scheme for roaming services in global mobility networks. Wirel Pers Commun 96(4):5881–5896.

    Article  Google Scholar 

  32. Bojjagani S, Sastry V (2017) A secure end-to-end sms-based mobile banking protocol. Int J Commun Syst 30(15):3302

    Article  Google Scholar 

  33. Dalal N, Shah J, Hisaria K, Jinwala D (2010) A comparative analysis of tools for verification of security protocols. Int J Commun Netw Syst Sci 3(10):779

    Google Scholar 

  34. Odelu V, Das AK, Kumari S, Huang X, Wazid M (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Futur Gener Comput Syst 68:74– 88

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Madhusudhan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Madhusudhan, R., R., S. Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. Peer-to-Peer Netw. Appl. 13, 82–103 (2020). https://doi.org/10.1007/s12083-019-0717-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-0717-x

Keywords

Navigation