Abstract
Mutual authentication scheme plays a significant role in the global mobility network to afford roaming service. However, designing secure and privacy-preserving authentication protocols for roaming service is always challenging. Due to the nature of wireless communication medium, these networks are vulnerable to security threats. In recent times, some authentication systems have been proposed for the mobile user roaming in the mobility environments. Nevertheless, most of the security protocols are prone to security attacks. In this paper, a secure mutual authentication protocol is designed using lightweight cryptographic primitives. The protocol design includes initialization phase, registration phase, mutual authentication phase, and the password change phase to ensure the user anonymity, privacy, and security in global mobility networks. In addition, we used a popular formal verification tool called AVISPA (Automated Validation of Internet Security Protocols and Applications) to check the correctness of the proposed protocol. Notably, the formal security analysis has been carried out through BAN logic, which proves the security strength of the proposed framework. Finally, a performance analysis shows that the proposed authentication system preserves low computational and communication overheads.
Similar content being viewed by others
References
Jiang, Q.; Ma, J.; Li, G.; Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477–1491 (2013)
Suzuki, S.; Nakada, K.: An authentication technique based on distributed security management for the global mobility network. Sel. Areas Commun. IEEE J. 15(8), 1608–1617 (1997)
Karuppiah, M.; Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)
Ha, J.: An efficient and robust anonymous authentication scheme in global mobility networks. Int. J. Secur. Appl. 9(10), 297–312 (2015)
Li, C.; Lee, C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1), 35–44 (2012)
He, D.; Ma, M.; Zhang, Y.; Chen, C.; Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)
Zhao, D.; Peng, H.; Li, L.; Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers Commun. 78(1), 247–269 (2014)
Karuppiah, M.; Kumari, S.; Li, X.; Wu, F.; Das, A.K.; Khan, M.K.; Saravanan, R.; Basu, S.: A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 93(2), 383–407 (2017)
Hao, Z.; Zhong, S.; Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)
Wen, F.; Susilo, W.; Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993–1004 (2013)
Wang, D.; He, D.; Wang, P.; Chu, C.-H.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Depend. Secure Comput. 12(4), 428–442 (2015)
Madhusudhan, R., et al.: An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. In: Proceedings of the 6th international conference on communication and network security, pp. 119–126 (2016). ACM
Lee, C.; Hwang, M.; Liao, E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. Ind. Electron. IEEE Trans. 53(5), 1683–1687 (2006)
Kang, D.; Jung, J.; Mun, J.; Lee, D.; Choi, Y.; Won, D.: Efficient and robust user authentication scheme that achieve user anonymity with a markov chain. Secur. Commun. Netw. 9(11), 1462–1476 (2016)
Gope, P.; Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10(4), 1370–1379 (2016)
Wu, F.; Xu, L.; Kumari, S.; Li, X.; Das, A.K.; Khan, M.K.; Karuppiah, M.; Baliyan, R.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9(16), 3527–3542 (2016)
Gope, P.; Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62, 1–8 (2016)
Guo, D.; Wen, F.: A more robust authentication scheme for roaming service in global mobility networks using ecc. IJ Netw. Secur. 18(2), 217–223 (2016)
Wu, F.; Xu, L.; Kumari, S.; Li, X.; Khan, M.K.; Das, A.K.: An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. Telecommun. 72(3–4), 131–144 (2017)
Arshad, H., Rasoolzadegan, A.: A secure authentication and key agreement scheme for roaming service with user anonymity. Int. J. Commun. Syst. (2017)
Wu, F.; Li, X.; Xu, L.; Kumari, S.; Sangaiah, A.K.: A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68, 107–118 (2018)
Madhusudhan, R.; et al.: A secure and lightweight authentication scheme for roaming service in global mobile networks. J. Inform. Secur. Appl. 38, 96–110 (2018)
Lee, C.-C.; Lai, Y.; Chen, C.; Chen, S.-D.: Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. An Int. J. 94(3), 1281–1296 (2017)
Shashidhara, R., Bojjagani, S., Maurya, A.K., Kumari, S., **ong, H.: A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 1–24,(2020)
Madhusudhan, R.; Shashidhara, R.: A novel dna based password authentication system for global roaming in resource-limited mobile environments. Multimedia Tools Appl. 79(3), 2185–2212 (2020)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—-CRYPTO’99, pp. 388–397 (1999). Springer
Mun, H.; Han, K.; Lee, Y.S.; Yeun, C.Y.; Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1), 214–222 (2012)
Burrows, M., Abadi, M.: A logic of authentication. In: Proc. R. Soc. Lond. A, vol. 426, pp. 233–271 (1989). The Royal Society
Armando, A., Basin, D., Cuellar, J., Rusinowitch, M., Viganò, L.: Avispa: automated validation of internet security protocols and applications. ERCIM News 64,(2006)
Basin, D.; Mödersheim, S.; Vigano, L.: Ofmc: a symbolic model checker for security protocols. Int. J. Inform. Secur. 4(3), 181–208 (2005)
Dolev, D.; Yao, A.: On the security of public key protocols. IEEE Trans. Inform. Theory 29(2), 198–208 (1983)
Glouche, Y., Genet, T., Heen, O., Courtay, O.: A security protocol animator tool for avispa. In: ARTIST2 workshop on security specification and verification of embedded systems, Pisa (2006)
Dai, W.: Crypto++ library 5.1-a free c++ class library of cryptographic schemes. http://www.cryptopp.com/ (2011)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shashidhara, R., Lajuvanthi, M. & Akhila, S. A Secure and Privacy-Preserving Mutual Authentication System for Global Roaming in Mobile Networks . Arab J Sci Eng 47, 1435–1446 (2022). https://doi.org/10.1007/s13369-021-05940-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-021-05940-w