Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

An Erratum to this article was published on 03 March 2015

Abstract

Rapid development of wireless networks brings about many security problems in mobile communications. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, Wen et al. proposed such scheme, which is claimed to be a slight modification of Qi et al.’s protocol based on smart card. However, we reveal that both the schemes still suffer from certain weaknesses and thus they cannot achieve desired security. Therefore, here we propose an improved protocol of Wen et al. which can immune to various known types of attacks like forgery attack, replay attack, known session key attack, backward and forward secrecy etc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230–234.

    MathSciNet  Google Scholar 

  2. Lee, C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environment. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.

    Article  Google Scholar 

  3. Wu, C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communication Letters, 12(10), 722–723.

    Article  Google Scholar 

  4. Cheng, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhance authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32, 611–618.

    Article  Google Scholar 

  5. Youn, T. Y., Park, T. H., & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks. IEEE Communication Letters, 13(7), 471–473.

    Article  Google Scholar 

  6. Tang, C., & Wu, D. O. (2008). Mobile privacy in wireless networks revisited. IEEE Transactions on Wireless Communication, 7, 1035–1042.

    Article  Google Scholar 

  7. Lu, J., & Zhou, J. (2010). On the security of an efficient mobile authentication scheme for wireless networks, WICOM2010. 6th International Conference on Wireless Communications Networking and Mobile Computing, (pp. 23–25). New York: IEEE Press.

  8. He, D., Ma, M., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61, 465–476.

    Article  Google Scholar 

  9. Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wireless Personal Communications, 68, 1477–1491.

    Article  Google Scholar 

  10. Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications. doi:10.1007/s11277-013-1243-4.

  11. Rosen, K. (1988). Elementary number theory and its applications. Boston: Addision Wesley.

    MATH  Google Scholar 

  12. Stalling, W. (2000). Cryptography and network security principles and practice. New Jersey: Prentice Hall.

    Google Scholar 

  13. Trappe, W., & Washington, C. (2006). Introduction to cryptography with coding theory. New Jersey: Prentice Hall.

    MATH  Google Scholar 

  14. Chang, C., Lee, J., & Chang, Y. (2005). Efficient authentication protocols of GSM. Computer Communications, 28(8), 921–928.

    Article  Google Scholar 

  15. Lo, C. C., & Chen, Y. J. (1997). Secure communication mechanisms for GSM networks. In Proceedings of the IEEE transactions on Consumer Electronics, 45, 1074–1080.

  16. Lee, T. F., Chang, C. C., & Hwang, T. (2005). Private authentication techniques for the global mobility network. Wireless Personal Communications, 35(4), 329–336.

    Article  Google Scholar 

  17. Hwang, T., & Gope, P. (2013). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications. doi:10.1007/s11277-013-1501-5.

  18. TS 33.102: (2001). Security architecture, version 4.2.0, released 4. Third generation partnership project-technical specification group.

  19. TR 33.902: (2000). Formal analysis of the 3G authentication protocol. Third generation partnership project-authentication and key agreement (AKA).

  20. Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proc. CRYPTO’99, LNCS 1666 (pp. 388–397). Berlin: Springer.

Download references

Acknowledgments

This work is financially supported by the National Science Council of Republic of China (Taiwan), under Contract No. NSC MOST 103-2221-E-006-177. The authors would like to thank the National Science Council of Republic of China for their benign supports. The authors also would like thank the editor and the anonymous referee for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzonelih Hwang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gope, P., Hwang, T. Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wireless Pers Commun 82, 2231–2245 (2015). https://doi.org/10.1007/s11277-015-2344-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2344-z

Keywords

Navigation