Main Article Content
Abstract
An efficient roaming service over wireless networks is essential for mobile users. It allows mobile users to seamlessly access the services provided by the home agent without losing connectivity when they visit a foreign network. This handover communication happens with the help of a foreign agent. In most cases, the communication between the mobile user and the foreign agent occurs over an unsecured channel. Therefore, researchers have proposed various authentication schemes to protect data transmitted over this unsecured channel. Most of the proposed schemes are focused on key agreement schemes. However, the key agreement schemes researchers have submitted are primarily high in computational and communication costs. Therefore, this research proposed an authenticated key agreement scheme based on passwords and smart cards with lower computational and communication costs without compromising the scheme’s security. This criterion was achieved due to using lower-cost operations and functions in the scheme. Moreover, the scheme’s development is based on the result of analyzing and improving other schemes proposed by other researchers.
Keywords
Article Details
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
- H. Arshad and A. Rasoolzadegan, “A Secure Authentication and Key Agreement Scheme for Roaming Service with User Anonymity,” International Journal of Communication Systems, vol. 30, no.18, pp. 1–18, 2017, doi: https://doi.org/10.1002/dac.3361.
- A. Ostad-Sharif, A. Babamohammadi, D. Abbasinezhad-Mood, and M. Nikooghadam, “Efficient Privacy-Preserving Authentication Scheme for Roaming Consumer in Global Mobility Networks,” International Journal of Communication Systems, vol. 32, no. 5, pp. 1–27, 2019, doi: https://doi.org/10.1002/dac.3904.
- B.A. Forouzan, TCP/IP Protocol Suite, 4th ed. NY, USA: McGraw-Hill Higher Education, 2010.
- Y.S. Patel, M. Reddy, and R. Misra, “Energy and Cost Trade-Off for Computational Tasks Offloading in Mobile Multi-Tenant Clouds,” Cluster Computing, vol. 24, no. 3, pp. 1793–1824, 2021, doi: https://doi.org/10.1007/s10586-020-03226-8.
- S.U.R. Malik, H. Akram, S.S. Gill, H. Pervaiz, and H. Malik, “EFFORT: Energy Efficient Framework for Offload Communication in Mobile Cloud Computing,” Software: Practice and Experience, vol. 51, no. 9, pp. 1896–1909, 2021, doi: https://doi.org/10.1002/spe.2850.
- L.D. Tsobdjou, S. Pierre, and A. Quintero, “A New Mutual Authentication and Key Agreement Protocol for Mobile Client - Server Environment,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1275–1286, 2021, doi: 10.1109/TNSM.2021.3071087.
- D. Wang, P. Wang, and J. Liu, “Improved Privacy-Preserving Authentication Scheme for Roaming Service in Mobile Networks,” IEEE Wireless Communications and Networking Conference, 2016, pp. 3136–3141, doi: 10.1109/WCNC.2014.6953015.
- L. Lamport, “Password Authentication with Insecure Communication,” Communication of the ACM, vol. 24, no. 11, 1981, pp. 770–772, doi: https://doi.org/10.1145/358790.358797.
- A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE Personal Communications, vol. 1, no. 1, pp. 25–31, 1994, doi: 10.1109/98.295357.
- C.-S. Park, “On Certificate-Based Security Protocols for Wireless Mobile Communication Systems,” IEEE Network, vol. 11, no. 5, pp. 50–55, 1997, doi: 10.1109/65.620522.
- J. Zhu and J. Ma, “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 231–235, 2004, doi: 10.1109/TCE.2004.1277867.
- C.-C. Lee, M.-S. Hwang, and I.-E. Liao, “Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683–1687, 2006, doi: 10.1109/TIE.2006.881998.
- J. Xu and D. Feng, “Security Flaws in Authentication Protocols with Anonymity for Wireless Environments,” ETRI Journal, vol. 31, no. 4, pp. 460–462, 2009, doi: https://doi.org/10.4218/etrij.09.0209.0026
- M. Karuppiah and R. Saravanan, “A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks,” Wireless Personal Communications, vol. 84, no. 3, pp. 2055–2078, 2015, doi: https://doi.org/10.1007/s11277-015-2524-x.
- M. Kang, H.S. Rhee, and J.-Y. Choi, “Improved User Authentication Scheme with User Anonymity for Wireless Communications,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 94, no. 2, pp. 860–864, 2011, doi: https://doi.org/10.1587/transfun.E94.A.860
- C. Guo and C. Y. Sun, “Lightweight Authenticated Key Agreement Scheme with Smart Cards for Wireless Mobile Networks,” Proceedings of 2017 the 7th International Workshop on Computer Science and Engineering, 2017, pp. 961–967, doi: 10.18178/wcse.2017.06.167.
- G. Xu, J. Liu, Y. Lu, X. Zeng, Y. Zhang, and X. Li, “A Novel Efficient MAKA Protocol with Desynchronization for Anonymous Roaming Service in Global Mobility Networks,” Journal of Network and Computer Applications, vol. 107, pp. 83–92, 2018, doi: https://doi.org/10.1016/j.jnca.2018.02.003.
- H.-T. Pan, H.-W. Yang, and M.-S. Hwang, “An Enhanced Secure Smart Card-Based Password Authentication Scheme,” International Journal of Network Security, vol. 22, no. 2, , pp. 358–363, 2020, doi: https://doi.org/10.1016/j.csi.2008.09.006.
- S. Dichenko and O. Finko, “Two-Dimensional Control and Assurance of Data Integrity in Information Systems Based on Residue Number System Codes and Cryptographic Hash Functions”, 2018, arXiv:1809.03251.
- F. Huo and G. Gong, “XOR Encryption Versus Phase Encryption, an in-Depth Analysis,” IEEE Transactions on Electromagnetic Compatibility, vol. 57, no. 4, pp. 903–911, 2015, doi: 10.1109/TEMC.2015.2390229.
- T.C.M. Dönmez and E. Nigussie, “Security of LoRaWAN v1.1 in Backward Compatibility Scenarios,” Procedia Computer Science, vol. 134, pp. 51–58, 2018, doi: https://doi.org/10.1016/j.procs.2018.07.143.
References
H. Arshad and A. Rasoolzadegan, “A Secure Authentication and Key Agreement Scheme for Roaming Service with User Anonymity,” International Journal of Communication Systems, vol. 30, no.18, pp. 1–18, 2017, doi: https://doi.org/10.1002/dac.3361.
A. Ostad-Sharif, A. Babamohammadi, D. Abbasinezhad-Mood, and M. Nikooghadam, “Efficient Privacy-Preserving Authentication Scheme for Roaming Consumer in Global Mobility Networks,” International Journal of Communication Systems, vol. 32, no. 5, pp. 1–27, 2019, doi: https://doi.org/10.1002/dac.3904.
B.A. Forouzan, TCP/IP Protocol Suite, 4th ed. NY, USA: McGraw-Hill Higher Education, 2010.
Y.S. Patel, M. Reddy, and R. Misra, “Energy and Cost Trade-Off for Computational Tasks Offloading in Mobile Multi-Tenant Clouds,” Cluster Computing, vol. 24, no. 3, pp. 1793–1824, 2021, doi: https://doi.org/10.1007/s10586-020-03226-8.
S.U.R. Malik, H. Akram, S.S. Gill, H. Pervaiz, and H. Malik, “EFFORT: Energy Efficient Framework for Offload Communication in Mobile Cloud Computing,” Software: Practice and Experience, vol. 51, no. 9, pp. 1896–1909, 2021, doi: https://doi.org/10.1002/spe.2850.
L.D. Tsobdjou, S. Pierre, and A. Quintero, “A New Mutual Authentication and Key Agreement Protocol for Mobile Client - Server Environment,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1275–1286, 2021, doi: 10.1109/TNSM.2021.3071087.
D. Wang, P. Wang, and J. Liu, “Improved Privacy-Preserving Authentication Scheme for Roaming Service in Mobile Networks,” IEEE Wireless Communications and Networking Conference, 2016, pp. 3136–3141, doi: 10.1109/WCNC.2014.6953015.
L. Lamport, “Password Authentication with Insecure Communication,” Communication of the ACM, vol. 24, no. 11, 1981, pp. 770–772, doi: https://doi.org/10.1145/358790.358797.
A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE Personal Communications, vol. 1, no. 1, pp. 25–31, 1994, doi: 10.1109/98.295357.
C.-S. Park, “On Certificate-Based Security Protocols for Wireless Mobile Communication Systems,” IEEE Network, vol. 11, no. 5, pp. 50–55, 1997, doi: 10.1109/65.620522.
J. Zhu and J. Ma, “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 231–235, 2004, doi: 10.1109/TCE.2004.1277867.
C.-C. Lee, M.-S. Hwang, and I.-E. Liao, “Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683–1687, 2006, doi: 10.1109/TIE.2006.881998.
J. Xu and D. Feng, “Security Flaws in Authentication Protocols with Anonymity for Wireless Environments,” ETRI Journal, vol. 31, no. 4, pp. 460–462, 2009, doi: https://doi.org/10.4218/etrij.09.0209.0026
M. Karuppiah and R. Saravanan, “A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks,” Wireless Personal Communications, vol. 84, no. 3, pp. 2055–2078, 2015, doi: https://doi.org/10.1007/s11277-015-2524-x.
M. Kang, H.S. Rhee, and J.-Y. Choi, “Improved User Authentication Scheme with User Anonymity for Wireless Communications,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 94, no. 2, pp. 860–864, 2011, doi: https://doi.org/10.1587/transfun.E94.A.860
C. Guo and C. Y. Sun, “Lightweight Authenticated Key Agreement Scheme with Smart Cards for Wireless Mobile Networks,” Proceedings of 2017 the 7th International Workshop on Computer Science and Engineering, 2017, pp. 961–967, doi: 10.18178/wcse.2017.06.167.
G. Xu, J. Liu, Y. Lu, X. Zeng, Y. Zhang, and X. Li, “A Novel Efficient MAKA Protocol with Desynchronization for Anonymous Roaming Service in Global Mobility Networks,” Journal of Network and Computer Applications, vol. 107, pp. 83–92, 2018, doi: https://doi.org/10.1016/j.jnca.2018.02.003.
H.-T. Pan, H.-W. Yang, and M.-S. Hwang, “An Enhanced Secure Smart Card-Based Password Authentication Scheme,” International Journal of Network Security, vol. 22, no. 2, , pp. 358–363, 2020, doi: https://doi.org/10.1016/j.csi.2008.09.006.
S. Dichenko and O. Finko, “Two-Dimensional Control and Assurance of Data Integrity in Information Systems Based on Residue Number System Codes and Cryptographic Hash Functions”, 2018, arXiv:1809.03251.
F. Huo and G. Gong, “XOR Encryption Versus Phase Encryption, an in-Depth Analysis,” IEEE Transactions on Electromagnetic Compatibility, vol. 57, no. 4, pp. 903–911, 2015, doi: 10.1109/TEMC.2015.2390229.
T.C.M. Dönmez and E. Nigussie, “Security of LoRaWAN v1.1 in Backward Compatibility Scenarios,” Procedia Computer Science, vol. 134, pp. 51–58, 2018, doi: https://doi.org/10.1016/j.procs.2018.07.143.