Main Article Content

Abstract




An efficient roaming service over wireless networks is essential for mobile users. It allows mobile users to seamlessly access the services provided by the home agent without losing connectivity when they visit a foreign network. This handover communication happens with the help of a foreign agent. In most cases, the communication between the mobile user and the foreign agent occurs over an unsecured channel. Therefore, researchers have proposed various authentication schemes to protect data transmitted over this unsecured channel. Most of the proposed schemes are focused on key agreement schemes. However, the key agreement schemes researchers have submitted are primarily high in computational and communication costs. Therefore, this research proposed an authenticated key agreement scheme based on passwords and smart cards with lower computational and communication costs without compromising the scheme’s security. This criterion was achieved due to using lower-cost operations and functions in the scheme. Moreover, the scheme’s development is based on the result of analyzing and improving other schemes proposed by other researchers.




Keywords

Cryptography Key agreement Smart card Global mobility network Roaming

Article Details

How to Cite
Ekal, G. B., Shahril Ismail, E., & Farhan bin Sabdin, A. R. (2023). Key Agreement Scheme Based on Smart Cards. Enthusiastic : International Journal of Applied Statistics and Data Science, 3(1), 1–15. https://doi.org/10.20885/enthusiastic.vol3.iss1.art1

References

  1. H. Arshad and A. Rasoolzadegan, “A Secure Authentication and Key Agreement Scheme for Roaming Service with User Anonymity,” International Journal of Communication Systems, vol. 30, no.18, pp. 1–18, 2017, doi: https://doi.org/10.1002/dac.3361.
  2. A. Ostad-Sharif, A. Babamohammadi, D. Abbasinezhad-Mood, and M. Nikooghadam, “Efficient Privacy-Preserving Authentication Scheme for Roaming Consumer in Global Mobility Networks,” International Journal of Communication Systems, vol. 32, no. 5, pp. 1–27, 2019, doi: https://doi.org/10.1002/dac.3904.
  3. B.A. Forouzan, TCP/IP Protocol Suite, 4th ed. NY, USA: McGraw-Hill Higher Education, 2010.
  4. Y.S. Patel, M. Reddy, and R. Misra, “Energy and Cost Trade-Off for Computational Tasks Offloading in Mobile Multi-Tenant Clouds,” Cluster Computing, vol. 24, no. 3, pp. 1793–1824, 2021, doi: https://doi.org/10.1007/s10586-020-03226-8.
  5. S.U.R. Malik, H. Akram, S.S. Gill, H. Pervaiz, and H. Malik, “EFFORT: Energy Efficient Framework for Offload Communication in Mobile Cloud Computing,” Software: Practice and Experience, vol. 51, no. 9, pp. 1896–1909, 2021, doi: https://doi.org/10.1002/spe.2850.
  6. L.D. Tsobdjou, S. Pierre, and A. Quintero, “A New Mutual Authentication and Key Agreement Protocol for Mobile Client - Server Environment,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1275–1286, 2021, doi: 10.1109/TNSM.2021.3071087.
  7. D. Wang, P. Wang, and J. Liu, “Improved Privacy-Preserving Authentication Scheme for Roaming Service in Mobile Networks,” IEEE Wireless Communications and Networking Conference, 2016, pp. 3136–3141, doi: 10.1109/WCNC.2014.6953015.
  8. L. Lamport, “Password Authentication with Insecure Communication,” Communication of the ACM, vol. 24, no. 11, 1981, pp. 770–772, doi: https://doi.org/10.1145/358790.358797.
  9. A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE Personal Communications, vol. 1, no. 1, pp. 25–31, 1994, doi: 10.1109/98.295357.
  10. C.-S. Park, “On Certificate-Based Security Protocols for Wireless Mobile Communication Systems,” IEEE Network, vol. 11, no. 5, pp. 50–55, 1997, doi: 10.1109/65.620522.
  11. J. Zhu and J. Ma, “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 231–235, 2004, doi: 10.1109/TCE.2004.1277867.
  12. C.-C. Lee, M.-S. Hwang, and I.-E. Liao, “Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683–1687, 2006, doi: 10.1109/TIE.2006.881998.
  13. J. Xu and D. Feng, “Security Flaws in Authentication Protocols with Anonymity for Wireless Environments,” ETRI Journal, vol. 31, no. 4, pp. 460–462, 2009, doi: https://doi.org/10.4218/etrij.09.0209.0026
  14. M. Karuppiah and R. Saravanan, “A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks,” Wireless Personal Communications, vol. 84, no. 3, pp. 2055–2078, 2015, doi: https://doi.org/10.1007/s11277-015-2524-x.
  15. M. Kang, H.S. Rhee, and J.-Y. Choi, “Improved User Authentication Scheme with User Anonymity for Wireless Communications,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 94, no. 2, pp. 860–864, 2011, doi: https://doi.org/10.1587/transfun.E94.A.860
  16. C. Guo and C. Y. Sun, “Lightweight Authenticated Key Agreement Scheme with Smart Cards for Wireless Mobile Networks,” Proceedings of 2017 the 7th International Workshop on Computer Science and Engineering, 2017, pp. 961–967, doi: 10.18178/wcse.2017.06.167.
  17. G. Xu, J. Liu, Y. Lu, X. Zeng, Y. Zhang, and X. Li, “A Novel Efficient MAKA Protocol with Desynchronization for Anonymous Roaming Service in Global Mobility Networks,” Journal of Network and Computer Applications, vol. 107, pp. 83–92, 2018, doi: https://doi.org/10.1016/j.jnca.2018.02.003.
  18. H.-T. Pan, H.-W. Yang, and M.-S. Hwang, “An Enhanced Secure Smart Card-Based Password Authentication Scheme,” International Journal of Network Security, vol. 22, no. 2, , pp. 358–363, 2020, doi: https://doi.org/10.1016/j.csi.2008.09.006.
  19. S. Dichenko and O. Finko, “Two-Dimensional Control and Assurance of Data Integrity in Information Systems Based on Residue Number System Codes and Cryptographic Hash Functions”, 2018, arXiv:1809.03251.
  20. F. Huo and G. Gong, “XOR Encryption Versus Phase Encryption, an in-Depth Analysis,” IEEE Transactions on Electromagnetic Compatibility, vol. 57, no. 4, pp. 903–911, 2015, doi: 10.1109/TEMC.2015.2390229.
  21. T.C.M. Dönmez and E. Nigussie, “Security of LoRaWAN v1.1 in Backward Compatibility Scenarios,” Procedia Computer Science, vol. 134, pp. 51–58, 2018, doi: https://doi.org/10.1016/j.procs.2018.07.143.