An efficient authentication protocol with user anonymity for mobile networks

Existing mobile authentication protocols are low in efficiency, because asymmetric encryption algorithms with large computational overheads are employed in these protocols to ensure user anonymity. In addition, the existing mobile authentication protocols have a long delay in fast reconnection, because these protocols may suffer from desynchronization attacks. In order to solve these problems, an efficient mutual authentication protocol with user anonymity for mobile networks is proposed. The proposed protocol ensures user anonymity by using one-way hash function. It reduces the delay time in fast reconnection, because once the session key between the mobile user and the foreign agent is found to be desynchronized in reconnection process, mobile users start the process of login and authentication from a new beginning immediately. The security of the proposed protocol is proved by using the provable security model. Compared with several existing authentication protocols for mobile networks, the proposed protocol is more secure and more effective.

[1]  Daojing He,et al.  A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network , 2010, 2010 13th International Conference on Network-Based Information Systems.

[2]  Jing Xu,et al.  Provable secure authentication protocol with anonymity for roaming service in global mobility networks , 2011, Comput. Networks.

[3]  Dengguo Feng,et al.  An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks , 2011, Comput. Commun..

[4]  Jipeng Zhou,et al.  On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[5]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[6]  Chun Chen,et al.  Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..

[7]  Qiong Pu,et al.  An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[8]  Yuh-Min Tseng,et al.  An efficient user authentication and key exchange protocol for mobile client-server environment , 2010, Comput. Networks.

[9]  Dapeng Wu,et al.  Mobile Privacy in Wireless Networks-Revisited , 2008, IEEE Transactions on Wireless Communications.

[10]  Chin-Chen Chang,et al.  Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.