Skip to main content
Log in

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the fast development of the Internet technology, there is an exponential growth in wireless networks-enabled applications across the globe. To ensure secure communication among all such applications, the authentication with key agreement has received maximum attention in recent times. Recently, Li et al. proposed an authentication with key agreement scheme using elliptic curve cryptosystem (ECC) for wireless mobile communications and claimed that their scheme could withstand different kinds of attacks. However, we find that their scheme cannot withstand various existing attacks. Also, their scheme suffers from the inefficiency of multiple secret keys. To improve security and performance, we propose a security-enhanced authentication with key agreement scheme using ECC for wireless mobile communications. Our analysis shows that the proposed scheme not only solves the security problems in Li et al.’s scheme, but also has better performance with respect to various selected metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Suzukiz S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617

    Article  Google Scholar 

  2. Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Personal Commun 68(4):1477–1491

    Article  Google Scholar 

  3. Abolhasan M, Wysocki T, Dutkiewicz E (2004) A review of routing protocols for mobile ad hoc networks. Ad hoc Netw 2(1):1–22

    Article  Google Scholar 

  4. Gu D, Zhang J (2003) QoS enhancement in IEEE 802. 11 wireless local area networks. IEEE Commun Mag 41(6):120–124

    Article  Google Scholar 

  5. Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772

    Article  MathSciNet  Google Scholar 

  6. Hwang M, Li L (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28–30

    Article  Google Scholar 

  7. Sun H (2000) An efficient remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):958–961

    Article  Google Scholar 

  8. Lu R, Cao Z, Zhu H (2007) An enhanced authenticated key agreement protocol for wireless mobile communication. Comput Stand Interfaces 29:647–652

    Article  Google Scholar 

  9. Lo J, Lee C, Hwang M (2010) A secure and efficient ECC-based AKA protocol for wireless mobile communications. Int J Innov Comput Inform Control 6(11):5249–5258

    Google Scholar 

  10. He D, Wu S, Chen J (2012) Note on ’Design of improved password authentication and update scheme based on elliptic curve cryptography’. Math Comput Modell 55(3–4):1661–1664

    Article  MathSciNet  MATH  Google Scholar 

  11. Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer Peer Netw Appl 8(6):1070–1081

    Article  Google Scholar 

  12. Li X, Niu J, Ma J, Wang W, Liu CL (2011) Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 34(1):73–79

    Article  Google Scholar 

  13. Li X, Zhang Y (2013) A simple and robust anonymous two-factor authenticated key exchange protocol. Secur Commun Netw 6(6):711–722

    Article  Google Scholar 

  14. Li W, Wen Q, Su Q, Jin Z (2012) An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput Commun 35(2):188–195

    Article  Google Scholar 

  15. Jiang Q, Ma J, Li G, Yang L (2014) An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel Personal Commun 77(2):1489–1506

    Article  Google Scholar 

  16. Niu J, Li X (2014) A novel user authentication scheme with anonymity for wireless communications. Secur Commun Netw 7(10):1467–1476

    MathSciNet  Google Scholar 

  17. Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–936

    Google Scholar 

  18. Li X, Niu J, Kumari S, Liao J, Liang W, Khan M (2015) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur Commun Netw. doi:10.1002/sec.1214

  19. Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178

    Google Scholar 

  20. He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform Sci 321(1):263–277

    Article  Google Scholar 

  21. He D, Zeadally S (2015) Authentication protocol for ambient assisted living system. IEEE Commun Mag 35(1):71–77

    Article  Google Scholar 

  22. He D, Kumar N, Chen J et al (2015) Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimed Syst 21(1):49–60

    Article  Google Scholar 

  23. He D, Wang D (2015) Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst J 9(3):816–823

    Article  Google Scholar 

  24. Rhee H, Kwon J, Lee D (2009) A remote user authentication scheme without using smart cards. Comput Stand Interfaces 31(1):6–13

    Article  Google Scholar 

  25. Li X, Wen Q, Zhang H, Jin Z (2013) An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int J Netw Mgmt 23:311–324

    Article  Google Scholar 

Download references

Acknowledgments

The authors thank the editor and the anonymous reviewers for their useful comments and suggestions which helped us improve the quality and presentation of this paper. The work was supported partially by the National Natural Science Foundation of China (Nos. 61402339, 61572379), the CICAEET fund, the PAPD fund and the Natural Science Foundation of Hubei Province of China under Grant 2015CFB257.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naveen Chilamkurti.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, H., Kumar, N., He, D. et al. A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J Supercomput 72, 3588–3600 (2016). https://doi.org/10.1007/s11227-015-1614-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1614-6

Keywords

Navigation