• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

Vol. 10, No.3, March 31, 2016
10.3837/tiis.2016.03.018, Download Paper (Free):

Abstract

With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attariā€™s scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Yanrong Lu, Lixiang Li, Haipeng Peng and Yixian Yang, "Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks," KSII Transactions on Internet and Information Systems, vol. 10, no. 3, pp. 1273-1288, 2016. DOI: 10.3837/tiis.2016.03.018

[ACM Style]
Lu, Y., Li, L., Peng, H., and Yang, Y. 2016. Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks. KSII Transactions on Internet and Information Systems, 10, 3, (2016), 1273-1288. DOI: 10.3837/tiis.2016.03.018