A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity
AbstractMany novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic) is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity. View Full-Text
Share & Cite This Article
Chain, K.; Kuo, W.-C.; Cheng, J.-C. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity. Appl. Sci. 2016, 6, 393.
Chain K, Kuo W-C, Cheng J-C. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity. Applied Sciences. 2016; 6(12):393.Chicago/Turabian Style
Chain, Kai; Kuo, Wen-Chung; Cheng, Jiin-Chiou. 2016. "A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity." Appl. Sci. 6, no. 12: 393.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.