TY - JOUR
T1 - Lightweight and provably secure user authentication with anonymity for the global mobility network
AU - Chen, Chun
AU - He, Daojing
AU - Chan, Sammy
AU - Bu, Jiajun
AU - Gao, Yi
AU - Fan, Rong
PY - 2011/3
Y1 - 2011/3
N2 - Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been proposed. This paper shows some security weaknesses in those schemes. Furthermore, a lightweight and provably secure user authentication scheme with anonymity for the GLOMONET is proposed. It uses only symmetric cryptographic and hash operation primitives for secure authentication. Besides, it takes only four message exchanges among the user, foreign agent and home agent. We also demonstrate that this protocol enjoys important security attributes including prevention of various attacks, single registration, user anonymity, user friendly, no password/verifier table, and use of one-time session key between mobile user and foreign agent. The security properties of the proposed protocol are formally validated by a model checking tool called AVISPA. Furthermore, as one of the new features in our protocol, it can defend smart card security breaches. © 2010 John Wiley & Sons, Ltd.
AB - Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been proposed. This paper shows some security weaknesses in those schemes. Furthermore, a lightweight and provably secure user authentication scheme with anonymity for the GLOMONET is proposed. It uses only symmetric cryptographic and hash operation primitives for secure authentication. Besides, it takes only four message exchanges among the user, foreign agent and home agent. We also demonstrate that this protocol enjoys important security attributes including prevention of various attacks, single registration, user anonymity, user friendly, no password/verifier table, and use of one-time session key between mobile user and foreign agent. The security properties of the proposed protocol are formally validated by a model checking tool called AVISPA. Furthermore, as one of the new features in our protocol, it can defend smart card security breaches. © 2010 John Wiley & Sons, Ltd.
KW - anonymity
KW - authentication
KW - global mobility network
KW - model checking
KW - security
KW - smart card
UR - http://www.scopus.com/inward/record.url?scp=79952059658&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-79952059658&origin=recordpage
U2 - 10.1002/dac.1158
DO - 10.1002/dac.1158
M3 - RGC 21 - Publication in refereed journal
SN - 1074-5351
VL - 24
SP - 347
EP - 362
JO - International Journal of Communication Systems
JF - International Journal of Communication Systems
IS - 3
ER -