Abstract

A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks. Recently, an efficient authentication system for global roaming has been proposed in the literature. In this article, we first show that the analyzed authentication system is vulnerable man-in-the-middle attack, replay attack and Denial-of-Service (DoS) attack, and it does not ensure untraceability and local password-verification process to identify wrong passwords. To fix these security flaws, we propose a more efficient and robust authentication system for roaming in mobility networks. We use the formal verification tools like ProVerif, Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham (BAN) logic to check the regularity of the authentication protocol. Moreover, we prove the secrecy of a session key through the formal security using the random oracle model, known as Real-Or-Random (ROR) model. Finally, a detailed performance evaluation proves that the security protocol not only provides a security strength, but also preserves the low computational overhead. Thus, the proposed authentication protocol is secure and computationally efficient as compared to other relevant schemes.

Highlights

  • Global roaming is a basic service for the users who roam across heterogeneous networks

  • Authentication and access control are considered as two main security services in various networking environments, such as global mobile network, IoT and wireless sensor network (WSN) [15]–[31]

  • 1) FORMAL SECURITY ANALYSIS USING ROR MODEL In Theorem 1, we prove that the proposed scheme provides the session key security under the widely-accepted ROR model

Read more

Summary

INTRODUCTION

Global roaming is a basic service for the users who roam across heterogeneous networks. In the global roaming scenario, the mutual authentication between an MU (Mobile User), HA (Home Agent) and, FA (Foreign Agent) is very crucial to prevent. A. MOTIVATION We analyzed the security strength of numerous mutual authentication systems in literature to provide global roaming in the mobility network. Most of the security protocols in the mobility network make use of static key agreements to deliver the shared secret between a user and service provider networks. In this regard, the entire security system will be compromised when the shared secret-key is deduced by the attacker. 2) A secure mutual authentication protocol has been designed to satisfy all security properties in the context of global roaming in mobile networks. The correctness of the security system has been proved using random oracle model. 5) a rigorous performance evaluation summarizes the communication and computational gain of the proposed security system under various constraints

PAPER OUTLINE The sequel of the paper as follows
BACKGROUND
THREAT MODEL
VULNERABLE TO MASQUERADE ATTACK
THE PROPOSED SCHEME
REGISTRATION PHASE
AUTHENTICATION PHASE
SECURITY ANALYSIS
Freshness Concatenation-Rule:
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call