Next Article in Journal
Probability of Interference-Optimal and Energy-Efficient Analysis for Topology Control in Wireless Sensor Networks
Next Article in Special Issue
Seismic Responses of a Cable-Stayed Bridge with Consideration of Uniform Temperature Load
Previous Article in Journal
A Novel Hybrid Semi-Active Mass Damper Configuration for Structural Applications
Previous Article in Special Issue
A Study on the Design of the Top Flange of a Modular T-Girder Bridge Using the Limit State Design Method
Article Menu

Export Article

Open AccessArticle
Appl. Sci. 2016, 6(12), 393; doi:10.3390/app6120393

A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

1
Department of Computer and Information Science, Republic of China Military Academy, Kaohsiung 83059, Taiwan
2
Department of Computer Science and Information Engineering, National Yunlin University of Science & Technology, Number 123 University Road, Section 3, Douliou, Yunlin 64002, Taiwan
3
Department of Computer Science and Information Engineering, Southern Taiwan University of Science and Technology, Tainan 71005, Taiwan
*
Author to whom correspondence should be addressed.
Academic Editors: Wen-Hsiang Hsieh and Christos Bouras
Received: 13 September 2016 / Revised: 5 November 2016 / Accepted: 24 November 2016 / Published: 30 November 2016
View Full-Text   |   Download PDF [728 KB, uploaded 30 November 2016]   |  

Abstract

Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic) is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity. View Full-Text
Keywords: roaming; anonymity; mutual authentication; elliptic curve discrete logarithm problem; wireless networks; BAN-logic roaming; anonymity; mutual authentication; elliptic curve discrete logarithm problem; wireless networks; BAN-logic
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Chain, K.; Kuo, W.-C.; Cheng, J.-C. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity. Appl. Sci. 2016, 6, 393.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Appl. Sci. EISSN 2076-3417 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top