Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks

March 2013
Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p313
Academic Journal
Most recently, Chang and Tsai proposed an anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. In this paper, we point out their scheme cannot provide user unlinkability, which is important to protect user privacy. Moreover, we find that if the delegation key of a mobile user is compromised, the identity of the user cannot be used any more. In addition, we also find it is not practical enough due to high computational cost involved, Thereafter, we propose a novel lightweight authentication scheme with anonymity and unlinkability for roaming service in large-scale wireless networks to overcome the foresaid defects. Moreover, we formally analyze our proposed scheme with the BAN-logic and show that it can withstand the several possible attacks.


Related Articles

  • Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Xie, Qi; Hu, Bin; Tan, Xiao; Bao, Mengjie; Yu, Xiuyuan // Wireless Personal Communications;Jan2014, Vol. 74 Issue 2, p601 

    Two-factor authentication scheme for roaming service in global mobility network enables the mobile user in possession of a password and a smart card to achieve mutual authentication and session key establishment with the foreign agent. In this paper, we first identify six properties of this type...

  • Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Jun-Sub Kim; Jin Kwak // International Journal of Security & Its Applications;2012, Vol. 6 Issue 3, p45 

    The user authentication scheme in a global mobility network is an important security issue that allows users of mobile devices to access a secure roaming service through wireless networks. Over recent years, many anonymous authentication schemes have been proposed for roaming services in global...

  • A Handoff Method Based on AAA for MIPv6. Jia Zong-pu; Zhang Jing // Proceedings of the International Symposium on Computer Science &;Aug2010, Vol. 2 Issue 1, p405 

    In the era of commercial demand increased day by day, the mobile IP protocol combined with AAA (Authentication, Authorization and Accounting) technology is widely used in authentication, authorization and billing issues. However, compared to single mobile IP switch protocol, because MIPv6-AAA...

  • Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks. Qi Xie; Dongzhao Hong; Mengjie Bao; Na Dong; Wong, Duncan S. // International Journal of Distributed Sensor Networks;2014, p1 

    Mobile roaming authentication scheme achieves the mutual authentication and session key establishment between the mobile user and the foreign agent. In 2013, Xie et al. pointed out that Chen et al.'s scheme is vulnerable to offline password attack, and does not achieve fair session key...

  • A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks. Peng Xiao; Jingsha He; Yingfang Fu // Journal of Networks;Feb2012, Vol. 7 Issue 2, p267 

    Roaming in wireless mesh networks (WMNs) requires that mobile nodes complete access authentication fast while protecting the identities of mobile nodes. In this paper, after analyzing some current authentication protocols for roaming in wireless mesh networks, we propose a new protocol based on...

  • An Analytical Performance Measure for Smooth Handoff in Mobile IPv6. Karpagavalli, N.; Balasubramanian, R. // International Journal of Advanced Networking & Applications;Nov/Dec2009, Vol. 1 Issue 3, p175 

    Mobility is the most important feature of a wireless communication system. The mobile device needs to connect multiple points of connection and perhaps multiple networks as it moves from one location to another. Handover management is the way a network uses to maintain connection to a mobile...

  • A wide-adapted bantam protocol for roaming across wireless areas. Lee, Jung-San; Tseng, Wan-Ting // Wireless Networks (10220038);Aug2013, Vol. 19 Issue 6, p1423 

    To guarantee stable convenience and feasibility of the widely applied wireless network, the handover technique is playing an important role nowadays to meet the epidemic mobile device usage. As is known, the wireless network authentication protocol can decide security for whole operating scheme...

  • Substitutive Mutual Authentication between Mobile Base Stations in Tactical Networks. Yu-Jin Son; Taeshik Shon; Young-Bae Ko // International Journal of Security & Its Applications;May2013, Vol. 7 Issue 3, p45 

    This paper proposes a cooperated mutual authentication scheme for mobile base stations (MBS) that construct a Wireless Mesh Network (WMN) in the Tactical Information Communication Networks (TICN). To enhance the fighting capabilities and survivability of soldiers in battlefields, it is crucial...

  • IMPACT OF MOBILITY MODELS ON MULTI-PATH ROUTING IN MOBILE AD HOC NETWORKS. Cooper, Nicholas; Meghanathan, Natarajan // International Journal of Computer Networks & Communications;2010, Vol. 2 Issue 1, p185 

    The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multi-path routing algorithms for mobile ad hoc networks (MANETs). We consider the following MANET mobility models: Random...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics