Abstract
Recently the advances in a variety of hardware/software technologies and wireless networking have brought explosive growth of mobile network/device involved services and it raised a number of security concerns such as user authentication/authorization, user information privacy and secure data transmission between service providers and consumers using mobile devices through mobile network. Therefore, it is essential that legitimate user authentication as well as user anonymity for privacy is ensured between those entities (service providers and consumers). As compared to stationary devices, due to high network latency and low computing performance of mobile network/devices, the authentication scheme in wireless and mobile networks requires a mechanism to achieve low communication and computation costs. Thus, in this paper we propose a lightweight authentication scheme. Also, the scheme ensures user’s anonymity and provides secure password update, session key agreement, and mutual authentication between entities to resist to possible attacks in ubiquitous networks. And we present security and performance analysis of our proposed scheme, and experimental results to show the efficiency of the scheme as well.
Similar content being viewed by others
References
Aaron C, Gernot H (2010) An analysis of power consumption in a Smartphone, In Proceedings of the 2010 USENIX conference on USENIX annual technical conference (USENIXATC’10), pp. 21–21
Buttyan L, Gbaguidi C, Staamann S, Wilhelm U (2000) Extensions to an authentication technique proposed for the global mobility network. IEEE Trans Commun 48(3):373–376
Chin LC, Chen CL, Chao YH (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(5):585–597
Chun C, Daojing H, Sammy C, Jiajun B, Yi G, Rong F (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61(2):465–476
He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050–1058
He D, Cui L, Huang H, Ma M (2009) Secure and efficient localization scheme in ultra-wideband sensor networks. Wirel Pers Commun 50(4):545–561
Hwang KF, Chang CC (2003) A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans Wirel Commun 2(2):400–407
Jiang Y, Lin C, Shen X, Shi M (2006) Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Trans Wirel Commun 5(9):2569–2577
Kocher P, Jaffe J, Jun B (1999) Differential power analysis, Proceeding of Advances in Cryptology (CRYPTO’99), Santa Barbara, CA, U.S.A., pp 388–397
Lee JS, Chang JH, Leer DH (2009) Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun Lett 13(5):722–723
Lee CY, Chang CC, Lin CH (2005) User authentication with anonymity for global mobility networks, In Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, pp 1–5
Lee CC, Hwang MS, Liao IE (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 53(5):1683–1687
Lin CH, Lee CY (2004) Cryptanalysis of a new authentication scheme with anonymity for wireless environments, In Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali, Indonesia, pp 339–402
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
National Institute of Standards and Technology (NIST) (2002) Secure Hash Standard. Federal Information Processing Standards Publication (FIPS PUB), pp 180–2
National Institute of Standards and Technology (NIST) (2008) Secure Hash Standard (SHS), Federal Information Processing Standards Publication (FIPS PUB), pp 180–3
Suzuki S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617
Tzeng ZJ, Tzeng WG (2011) Authentication of mobile users in third generation mobile systems. Wirel Pers Commun 16(1):35–50
Wu CC, Lee WB, Tsaur WJ (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
Xu J, Zhu WT, Feng DG (2011) An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput Commun 34(3):319–325
Zeng P, Cao Z, Choo KK, Wang S (2009) On the anonymity of some authentication schemes for wireless communications. IEEE Commun Lett 13(3):170–171
Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234
Acknowledgments
This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the “Employment Contract based Master’s Degree Program for Information Security” supervised by the KISA (Korea Internet Security Agency).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shin, S., Yeh, H. & Kim, K. An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw. Appl. 8, 674–683 (2015). https://doi.org/10.1007/s12083-013-0218-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-013-0218-2