Skip to main content
Log in

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Recently the advances in a variety of hardware/software technologies and wireless networking have brought explosive growth of mobile network/device involved services and it raised a number of security concerns such as user authentication/authorization, user information privacy and secure data transmission between service providers and consumers using mobile devices through mobile network. Therefore, it is essential that legitimate user authentication as well as user anonymity for privacy is ensured between those entities (service providers and consumers). As compared to stationary devices, due to high network latency and low computing performance of mobile network/devices, the authentication scheme in wireless and mobile networks requires a mechanism to achieve low communication and computation costs. Thus, in this paper we propose a lightweight authentication scheme. Also, the scheme ensures user’s anonymity and provides secure password update, session key agreement, and mutual authentication between entities to resist to possible attacks in ubiquitous networks. And we present security and performance analysis of our proposed scheme, and experimental results to show the efficiency of the scheme as well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Aaron C, Gernot H (2010) An analysis of power consumption in a Smartphone, In Proceedings of the 2010 USENIX conference on USENIX annual technical conference (USENIXATC’10), pp. 21–21

  2. Buttyan L, Gbaguidi C, Staamann S, Wilhelm U (2000) Extensions to an authentication technique proposed for the global mobility network. IEEE Trans Commun 48(3):373–376

    Article  Google Scholar 

  3. Chin LC, Chen CL, Chao YH (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(5):585–597

    Article  Google Scholar 

  4. Chun C, Daojing H, Sammy C, Jiajun B, Yi G, Rong F (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362

    Article  Google Scholar 

  5. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MATH  MathSciNet  Google Scholar 

  6. He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61(2):465–476

    Article  Google Scholar 

  7. He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050–1058

    Article  Google Scholar 

  8. He D, Cui L, Huang H, Ma M (2009) Secure and efficient localization scheme in ultra-wideband sensor networks. Wirel Pers Commun 50(4):545–561

    Article  Google Scholar 

  9. Hwang KF, Chang CC (2003) A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans Wirel Commun 2(2):400–407

    Article  MathSciNet  Google Scholar 

  10. Jiang Y, Lin C, Shen X, Shi M (2006) Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Trans Wirel Commun 5(9):2569–2577

    Article  Google Scholar 

  11. Kocher P, Jaffe J, Jun B (1999) Differential power analysis, Proceeding of Advances in Cryptology (CRYPTO’99), Santa Barbara, CA, U.S.A., pp 388–397

  12. Lee JS, Chang JH, Leer DH (2009) Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun Lett 13(5):722–723

    Google Scholar 

  13. Lee CY, Chang CC, Lin CH (2005) User authentication with anonymity for global mobility networks, In Proceedings of IEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, pp 1–5

  14. Lee CC, Hwang MS, Liao IE (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 53(5):1683–1687

    Google Scholar 

  15. Lin CH, Lee CY (2004) Cryptanalysis of a new authentication scheme with anonymity for wireless environments, In Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali, Indonesia, pp 339–402

  16. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    Article  MathSciNet  Google Scholar 

  17. National Institute of Standards and Technology (NIST) (2002) Secure Hash Standard. Federal Information Processing Standards Publication (FIPS PUB), pp 180–2

  18. National Institute of Standards and Technology (NIST) (2008) Secure Hash Standard (SHS), Federal Information Processing Standards Publication (FIPS PUB), pp 180–3

  19. Suzuki S, Nakada K (1997) An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 15(8):1608–1617

    Article  Google Scholar 

  20. Tzeng ZJ, Tzeng WG (2011) Authentication of mobile users in third generation mobile systems. Wirel Pers Commun 16(1):35–50

    Article  Google Scholar 

  21. Wu CC, Lee WB, Tsaur WJ (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723

    Article  Google Scholar 

  22. Xu J, Zhu WT, Feng DG (2011) An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput Commun 34(3):319–325

    Article  Google Scholar 

  23. Zeng P, Cao Z, Choo KK, Wang S (2009) On the anonymity of some authentication schemes for wireless communications. IEEE Commun Lett 13(3):170–171

    Article  Google Scholar 

  24. Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234

    MathSciNet  Google Scholar 

Download references

Acknowledgments

This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the “Employment Contract based Master’s Degree Program for Information Security” supervised by the KISA (Korea Internet Security Agency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangseok Kim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shin, S., Yeh, H. & Kim, K. An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw. Appl. 8, 674–683 (2015). https://doi.org/10.1007/s12083-013-0218-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-013-0218-2

Keywords

Navigation