An efficient and secure anonymous mobility network authentication scheme

The demands of Internet users are steadily increasing. Many users access Internet services through mobile devices via wireless networks. To prevent disclosure of private data, researchers have proposed various anonymous roaming authentication schemes which apply different technologies to provide integral security properties, such as symmetric and asymmetric encryption, digital signature, timestamp, etc. Unfortunately, some of these schemes still exhibit security and efficiency issues. In order to provide tripartite authentication and enhance efficiency, we propose an efficient and secure anonymous authentication scheme for mobility networks. According to our performance and security analysis, we can prove that our proposed scheme is able to enhance efficiency and improve security in comparison to previous schemes.

[1]  Dong Hoon Lee,et al.  Security flaw of authentication scheme with anonymity for wireless communications , 2009, IEEE Communications Letters.

[2]  Wei-Bin Lee,et al.  A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..

[3]  Jun-Sub Kim,et al.  Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2012 .

[4]  Qiong Pu,et al.  An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[5]  Dong Hoon Lee,et al.  Anonymous authentication with unlinkability for wireless environments , 2011, IEICE Electron. Express.

[6]  Chan Yeob Yeun,et al.  Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2016, Wireless Personal Communications.

[7]  Jing Xu,et al.  Security Flaws in Authentication Protocols with Anonymity for Wireless Environments , 2009 .

[8]  Cheng-Chi Lee,et al.  A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..

[9]  Chin-Chen Chang,et al.  Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[10]  Jianfeng Ma,et al.  A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..

[11]  Cheng-Chi Lee,et al.  Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.

[12]  Zhenfu Cao,et al.  On the anonymity of some authentication schemes for wireless communications , 2009, IEEE Commun. Lett..

[13]  Jing Xu,et al.  Provable secure authentication protocol with anonymity for roaming service in global mobility networks , 2011, Comput. Networks.

[14]  Chang-Seop Park,et al.  Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems , 2004, Comput. Networks.