Abstract

With the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the information is transmitted over an open channel. Thus, secure and efficient authentication protocols are essential to provide secure roaming services for legitimate users. In 2018, Madhusudhan et al. presented a secure authentication protocol for global mobile networks. However, we demonstrated that their protocol could not prevent potential attacks, including masquerade, session key disclosure, and replay attacks. Thus, we proposed a secure and efficient three-factor authentication protocol to overcome the security weaknesses of Madhusudhan et al.’s scheme. The proposed scheme was demonstrated to prevent various attacks and provided a secure mutual authentication by utilizing biometrics and secret parameters. We evaluated the security of the proposed protocol using informal security analysis and formal security analysis, such as the real-or-random (ROR) model and Burrows–Abadi–Needham (BAN) logic. In addition, we showed that our scheme withstands man-in-the-middle (MITM) and replay attacks utilizing formal security validation automated validation of internet security protocols and applications (AVISPA) simulation. Finally, we compared the performance of our protocol with existing schemes. Consequently, our scheme ensured better security and efficiency features than existing schemes and can be suitable for resource-constrained mobile environments.

Highlights

  • With the advances in wireless communication technology, the global mobility network (GLOMONET) [1,2,3] has become a popular means of communication

  • If a MUa may try to impersonate a mobile user by resending messages that were exchanged in a previous session, MUa cannot obtain the previous messages because the home agent (H A) checks whether R∗Mobile User (MU) =

  • We show the results of the AVISPA simulation using Constraint-Logic-based ATtack SEarcher (CL-AtSe) and On-the-Fly Model Checker (OFMC) to verify the security of our protocol

Read more

Summary

Introduction

With the advances in wireless communication technology, the global mobility network (GLOMONET) [1,2,3] has become a popular means of communication. In 2012, Li et al [13] assessed that Wu et al.’s [12] scheme could not withstand replay and masquerade attacks and could not provide user anonymity To overcome these security flaws, Li et al [13] proposed a novel user authentication scheme based smart-card to provide efficient high computational and communication overheads. In 2018, Madhusudhan et al [16] presented a secure and efficient user authentication scheme for GLOMONET using a mobile device to resolve the security problems of Marimuthu and Saravanan’s scheme. We proposed a secure and efficient three-factor user authentication scheme for roaming services in GLOMONET to resolve the security flaws of Madhusudhan et al.’s scheme

Motivation and Contributions
Security Requirements
Organization
Attacker Model
Fuzzy Extractors
Initialization Process
Registration Process
H A checks IDFA
Password Update Process
Masquerade Attack
Replay Attack
Session Key Disclosure Attack
Mutual Authentication
Proposed Secure and Efficient Authentication Protocol for GLOMONET
H A checks ID MU
Stolen Mobile Device Attack
Anonymity
User Friendliness
Security Properties
Authentication Proof Using BAN Logic
Proof Using BAN Logic
ROR Model Analysis
Security Proof
AVISPA Simulation
HLPSL Specification
Result Analysis of AVISPA Simulation
Performance Analysis
Computation Cost
Communication Cost
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.