Next Article in Journal
On a Generalization of a Lucas’ Result and an Application to the 4-Pascal’s Triangle
Next Article in Special Issue
A Robust Hybrid Iterative Linear Detector for Massive MIMO Uplink Systems
Previous Article in Journal
Primeness of Relative Annihilators in BCK-Algebra
Previous Article in Special Issue
Impact of Stair and Diagonal Matrices in Iterative Linear Massive MIMO Uplink Detectors for 5G Wireless Networks
Open AccessArticle

A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks

1
Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Department of Computer Engineering, Faculty of Engineering and Architecture Istanbul Gelisim University Istanbul, Avcılar, 34310 Istanbul, Turkey
3
Department of Electrical Engineering, College of Electronics and Information Engineering, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Korea
*
Authors to whom correspondence should be addressed.
Symmetry 2020, 12(2), 287; https://doi.org/10.3390/sym12020287 (registering DOI)
Received: 16 January 2020 / Revised: 8 February 2020 / Accepted: 10 February 2020 / Published: 15 February 2020
(This article belongs to the Special Issue Information Technologies and Electronics)
The roaming service enables a remote user to get desired services, while roaming in a foreign network through the help of his home network. The authentication is a pre-requisite for secure communication between a foreign network and the roaming user, which enables the user to share a secret key with foreign network for subsequent private communication of data. Sharing a secret key is a tedious task due to underneath open and insecure channel. Recently, a number of such schemes have been proposed to provide authentication between roaming user and the foreign networks. Very recently, Lu et al. claimed that the seminal Gopi-Hwang scheme fails to resist a session-specific temporary information leakage attack. Lu et al. then proposed an improved scheme based on Elliptic Curve Cryptography (ECC) for roaming user. However, contrary to their claim, the paper provides an in-depth cryptanalysis of Lu et al.’s scheme to show the weaknesses of their scheme against Stolen Verifier and Traceability attacks. Moreover, the analysis also affirms that the scheme of Lu et al. entails incorrect login and authentication phases and is prone to scalability issues. An improved scheme is then proposed. The scheme not only overcomes the weaknesses Lu et al.’s scheme but also incurs low computation time. The security of the scheme is analyzed through formal and informal methods; moreover, the automated tool ProVerif also verifies the security features claimed by the proposed scheme. View Full-Text
Keywords: roaming user; authentication; internet of things; mobile networks; anonymity; elliptic curve cryptography; ProVerif roaming user; authentication; internet of things; mobile networks; anonymity; elliptic curve cryptography; ProVerif
Show Figures

Figure 1

MDPI and ACS Style

Alzahrani, B.A.; Chaudhry, S.A.; Barnawi, A.; Al-Barakati, A.; Alsharif, M.H. A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks. Symmetry 2020, 12, 287.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop