Information Security Journal: A Global Perspective A secure and privacy-preserving lightweight authentication protocol for wireless communications (original) (raw)

Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks

2018

Group signature schemes existentially provide anonymity, non-repudiation and can make a mobile device untraceable. But using group signature only in designing anonymous key exchange system is time wasting and consumes much of other computing resources hence the use of it must be minimal especially when deployed on resources-constrained mobile devices. In .this paper, we propose the combined use of group signature because of its inherent security properties which are very important when a mobile user roams in the insecure wireless network and message authentication code to reduce the huge computational burden occasioned by group signature’s expensive public key operations resulting in unbearable authentication latency. In this paper, we built two authenticators, a signature based authenticator and a message authentication code based authenticator. These models are based on the Canetti-Krawczyk model. We implemented the design using Java 8 on Android Studio 2.2 and tested it on Genymo...

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks

Security and Communication Networks, 2016

Ubiquitous networks provide effective roaming services for mobile users (MUs). Through the worldwide roaming technology, authorized MUs can avail ubiquitous network services. Important security issues to be considered in ubiquitous networks are authentication of roaming MUs and protection of privacy of MUs. However, because of the broadcast nature of wireless channel and resource limitations of terminals, providing efficient user authentication with privacy preservation is a challenging task. Very recently, Farash et al. proposed an authentication scheme with anonymity for consumer roaming in ubiquitous networks and claimed their scheme achieves all security requirements. In this paper, we show that the scheme of Farash et al. fails to achieve user anonymity and mutual authentication. Their scheme also fails to provide local password verification, and it has a faulty password change phase. Moreover, their scheme is vulnerable to replay, offline password guessing, and forgery attacks. To fix the security flaws of the scheme of Farash et al., we present an improved authentication scheme for accessing roaming service provided by ubiquitous networks. We then formally verify the security properties of our scheme by the widely-accepted pushbutton tool called Automated Validation of Internet Security Protocols and Applications. Security and performance analyses show that our scheme is more powerful, efficient, and secure when it is compared with existing schemes.

Privacy preserving lightweight authentication scheme for roaming service in global mobile networks

International Journal of Advances in Applied Sciences (IJAAS), 2024

The swift advancement of mobile intelligent terminals and services enables users to seamlessly access ubiquitous services across global mobile networks. Ensuring the authentication and safeguarding of the privacy of network entities is crucial. Numerous authentication and privacy schemes have been put forth over time, yet many of them have faced security and privacy challenges. A recent contribution introduces a lightweight authentication scheme (LAS) designed for roaming services within global mobile networks. They assert that their scheme offers user anonymity, mutual authentication, fair key agreement, and user-friendliness, claiming resilience against various attacks in global mobile networks. This paper, however, identifies two design flaws in the LAS and highlights its vulnerability to two masquerading attacks and a mobile user (MU) trace attack. Consequently, we propose a privacy-preserving LAS tailored for global mobile networks. Our analysis demonstrates that the proposed authentication scheme is secure and delivers enhanced privacy with efficient performance.

Towards An Efficient Protocol for Privacy and Authentication in Wireless Networks

2013

We envision a scenario for security of wireless networks that include and integrate nodes of all different capabilities, including tiny sensors or similarly battery-powered, resourceconstrained tiny nodes. However, the existing Wireless Protected Access (WPA) protocol may not be suitable for such resourceconstrained, low-end nodes as the protocol could be too demanding since its existing authentication and privacy mechanisms can cause many inconveniences due their complexity in computation and key management. In this work, we propose an efficient protocol for authentication and privacy in wireless networks using identity-based encryption(IBE) techniques. Specifically, we propose an enhanced or extended version of the WPA protocol by incorporating IBE based authentication methods in the existing WPA protocol at the link layer level. The enhanced WPA protocol can be used for small and resource-constrained wireless devices to integrate them in existing wireless networks. Keywords—Ellip...

A lightweight identity authentication protocol for wireless networks

Computer Communications, 2004

Mobile and wireless communication networks have created a major breakthrough in new telecom applications and services. Unfortunately, wireless networking is a double edged sword. Ever since it introduced new factors such as mobility, the temptation for unauthorized access and eavesdropping has been a reality because an attacker could easily access the transport medium. For that and in order to defend against targeted attackers, wireless networks need to define robust and layered protection mechanisms. In this paper, we present a TLS-based protocol named Light-Transport Layer Security (TLS), a lightweight identity authentication protocol for access control and key calculation and distribution for both mobile clients (WAP, GPRS) and application servers. The performance and the efficiency of our proposed protocol were performed using two Java Card Smartcards and then analyzed and compared to other solutions. The results demonstrate that our protocol efficiently manages to reduce the computation times and the message load and transport during the authentication phase. q (M. Badra), serhrouchni@enst.fr (A. Serhrouchni), urien@enst.fr (P. Urien).

Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks

IEEE Systems Journal, 2015

User authentication is an imperative security mechanism for recognizing legal roaming users. However, designing an expeditious anonymous-user authentication scheme in the global mobility networking (GLOMONET) environment is always a challenging task. Because, due to the broadcast nature of the wireless channels, wireless networks are often susceptible to various attacks and mobile devices powered by batteries that have limited communication, processing, and storage capabilities. In this paper, we propose a lightweight, secure, and an expeditious authentication scheme, which can preserve the user anonymity for roaming services in GLOMONET. In this regard, we use the low-cost cryptographic primitives such as one-way hash functions and EXCLUSIVE-OR operations to accomplish goals, which is more suitable for battery-powered mobile devices. Although some authentication protocols for GLOMONET security have already been proposed, however, they are unable to achieve the desired imperative security properties, such as anonymity, privacy against eavesdroppers, communication security, etc. As a consequence of that, they are vulnerable to various security issues. Security and performance analyses show that our proposed scheme is secure and even more efficient, as compared with other related authentication schemes in GLOMONET.

A light weight authentication scheme for mobile wireless Internet applications

2003

The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing technology. Significant efforts have been devoted in research organizations and academia to securing the mobile cloud computing technology. In this paper we proposed a lightweight authentication protocol for mobile cloud environment. Our proposed protocol has many advantages such as: supporting user anonymity, local authentication and also resistance against related attacks such as replay attack, stolen verifier attack, modification attack, server spoofing attack and so on.

An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks

International Journal of Cyber Warfare and Terrorism, 2013

The authors envision a scenario for security of wireless networks that include and integrate nodes of all different capabilities, including tiny sensors or similarly battery-powered, resource-constrained tiny nodes. However, the existing Wireless Protected Access (WPA) protocol that supports security services for wireless networks today may not be suitable for such resource-constrained, low-end nodes since its existing authentication and privacy mechanisms are complex and computationally intensive. In this work, the authors propose an efficient protocol for authentication and privacy in wireless networks using identity-based encryption (IBE) techniques. Specifically, the authors propose an enhanced and extended version of the WPA protocol by incorporating IBE based authentication methods in the existing WPA protocol at the link layer level. The enhanced WPA protocol can be used for small and resource-constrained wireless devices to integrate them in existing wireless networks. Their proposed protocol is proven to be secure against common attacks and vulnerabilities in wireless networks. Also, the authors' analysis of the protocol shows that it is feasible and efficient in terms of computation, communication, and storage overheads to support many resource-constrained devices.

Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

Journal of Applied Mathematics, 2013

In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

A secure and efficient authentication protocol for anonymous channel in wireless communications

Applied Mathematics and Computation, 2005

For enhancing the efficiency and the security in anonymous channel of wireless systems, many protocols were proposed. However, most of them employed asymmetric cryptosystems to protect the identity of the mobile user. As we know, the drawbacks of asymmetric cryptosystem are complex and high computation cost. Therefore, if the wireless system is based on asymmetric cryptosystem, that is not convenience for the mobile device and infrastructure. Not only that, an important problem also exists in the previous protocols. That is when the mobile user copies his anonymous ticket and shares it with friends, the visiting network cannot discriminate the copy of the ticket. That seriously effects the right of the visiting network. In this paper, we shall propose a secure and efficient authentication protocol to withstand the above weakness without employing any asymmetric cryptosystems.