| Literature DB >> 29702675 |
Ahmed Fraz Baig1, Khwaja Mansoor Ul Hassan1, Anwar Ghani1, Shehzad Ashraf Chaudhry1, Imran Khan1, Muhammad Usman Ashraf1,2.
Abstract
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.Entities:
Mesh:
Year: 2018 PMID: 29702675 PMCID: PMC5922536 DOI: 10.1371/journal.pone.0196061
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Global mobility networks authentication.
Notations guide.
| Notation | Description | Notation | Description |
|---|---|---|---|
| Mobile Node | Home Node | ||
| Foreign Node | Timestamps of entity A | ||
| Pre-shared key between | Session key | ||
| one way hash function | ⊕ | The XOR operation | |
| Δ | Expected time interval for transmission delay | ‖ | The concatenation operation |
Fig 2Login and mutual authentication phase of proposed scheme.
Fig 31(a).
Fig 41(b).
Fig 51(c).
Fig 61(d).
Fig 71(e).
Fig 81(f).
Security Requirements.
| Schemes | R1 | R2 | R3 | R4 | R5 | R6 | R7 | R8 | R9 | R10 | R11 | R12 | R13 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Yoon et al. | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 |
| Mun et al. | 0 | 1 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 1 | 1 | 0 | 0 |
| Lee et al. | 0 | 1 | 1 | 1 | 0 | 1 | 1 | 0 | 1 | 1 | 1 | 0 | 0 |
| Proposed Scheme | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |
| 1: Provides, 0: Does not Provide | |||||||||||||
Notations guide for computation cost.
| Computation-cost of | One-way-hash operation | ||
| Computation-cost of | XOR operation | ||
| Computation-cost of | Random number generation | ||
| Total Computation-cost | Elliptic curve Point Multiplication | ||
| Symmetric Encryption | Symmetric Decryption |
Computation Cost.
| Schemes | ||||
|---|---|---|---|---|
| Mun et al. | 3 | 5 | 3 | 11 |
| Gope et al. | 6 | 10 | 5 | 21 |
| Lee et al. | 12 | 10 | 10 | 32 |
| Chaudhry et al. | 5 | 3 | 1 | 8 |
| Proposed Scheme | 6 | 5 | 1 | 12 |
Fig 9Execution time and performance comparison.