Abstract
Rapid development of wireless networks brings about many security problems in mobile communications. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, Wen et al. proposed such scheme, which is claimed to be a slight modification of Qi et al.’s protocol based on smart card. However, we reveal that both the schemes still suffer from certain weaknesses and thus they cannot achieve desired security. Therefore, here we propose an improved protocol of Wen et al. which can immune to various known types of attacks like forgery attack, replay attack, known session key attack, backward and forward secrecy etc.
Similar content being viewed by others
References
Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230–234.
Lee, C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environment. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.
Wu, C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communication Letters, 12(10), 722–723.
Cheng, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhance authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32, 611–618.
Youn, T. Y., Park, T. H., & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks. IEEE Communication Letters, 13(7), 471–473.
Tang, C., & Wu, D. O. (2008). Mobile privacy in wireless networks revisited. IEEE Transactions on Wireless Communication, 7, 1035–1042.
Lu, J., & Zhou, J. (2010). On the security of an efficient mobile authentication scheme for wireless networks, WICOM2010. 6th International Conference on Wireless Communications Networking and Mobile Computing, (pp. 23–25). New York: IEEE Press.
He, D., Ma, M., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61, 465–476.
Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wireless Personal Communications, 68, 1477–1491.
Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications. doi:10.1007/s11277-013-1243-4.
Rosen, K. (1988). Elementary number theory and its applications. Boston: Addision Wesley.
Stalling, W. (2000). Cryptography and network security principles and practice. New Jersey: Prentice Hall.
Trappe, W., & Washington, C. (2006). Introduction to cryptography with coding theory. New Jersey: Prentice Hall.
Chang, C., Lee, J., & Chang, Y. (2005). Efficient authentication protocols of GSM. Computer Communications, 28(8), 921–928.
Lo, C. C., & Chen, Y. J. (1997). Secure communication mechanisms for GSM networks. In Proceedings of the IEEE transactions on Consumer Electronics, 45, 1074–1080.
Lee, T. F., Chang, C. C., & Hwang, T. (2005). Private authentication techniques for the global mobility network. Wireless Personal Communications, 35(4), 329–336.
Hwang, T., & Gope, P. (2013). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications. doi:10.1007/s11277-013-1501-5.
TS 33.102: (2001). Security architecture, version 4.2.0, released 4. Third generation partnership project-technical specification group.
TR 33.902: (2000). Formal analysis of the 3G authentication protocol. Third generation partnership project-authentication and key agreement (AKA).
Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proc. CRYPTO’99, LNCS 1666 (pp. 388–397). Berlin: Springer.
Acknowledgments
This work is financially supported by the National Science Council of Republic of China (Taiwan), under Contract No. NSC MOST 103-2221-E-006-177. The authors would like to thank the National Science Council of Republic of China for their benign supports. The authors also would like thank the editor and the anonymous referee for their valuable comments.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gope, P., Hwang, T. Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wireless Pers Commun 82, 2231–2245 (2015). https://doi.org/10.1007/s11277-015-2344-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2344-z