You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

30 November 2016

A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

,
and
1
Department of Computer and Information Science, Republic of China Military Academy, Kaohsiung 83059, Taiwan
2
Department of Computer Science and Information Engineering, National Yunlin University of Science & Technology, Number 123 University Road, Section 3, Douliou, Yunlin 64002, Taiwan
3
Department of Computer Science and Information Engineering, Southern Taiwan University of Science and Technology, Tainan 71005, Taiwan
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Selected Papers from the International Multi-Conference on Engineering and Technology Innovation 2015 (IMETI2015)

Abstract

Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic) is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

1. Introduction

Wireless networks and smartphones have undergone rapid developments, allowing the use of the same device across different networks [1,2]. Users such as businessmen or tourists visiting a new area can use a smart card to register with their home agents. Such cards use an anonymous connection to register to the home agent from the foreign agent server [3,4]. After validation, a temporary certificate is sent to the user. The user may use this temporary certificate for network roaming via the foreign agent server. This approach can provide billing information while maintaining anonymity [5,6,7,8].
In general, an anonymous roaming scheme has three entities: mobile user (MU), foreign agent (FA), and home agent (HA) [9,10,11,12,13]. In communication, the user must remain anonymous to the other entities. This scheme consists of three phases: registration (initialization phase), authentication (first phase), and roaming (second phase) [14,15,16]. When an MU is anonymously roaming in a foreign network, it can use one of two methods: real-time online and offline. Real-time online means that when a user requests roaming permissions, the FA can immediately authenticate with the HA and verify the user’s legitimacy. The FA is unaware of the user’s true identity but only knows whether the user is legitimate. Offline means that when the user requests roaming permissions, the FA can verify the user’s legitimacy directly through the information obtained during the registration phase. In other words, this method does not use a real-time connection with the HA to verify the user, and the FA does not know the user’s true identity [17,18,19,20,21,22,23]. In this study, the mobile phone roaming anonymous login is based on the real-time online method.
In 2004, Zhu and Ma [24] first proposed an authentication scheme with anonymity for wireless environments. Although they claimed that their scheme was secure, some weaknesses remained. The attacker can obtain r (r = H(N||IDHA)⊕H(N||IDMU)⊕IDHA⊕IDMU) by registering and calculating the HA’s private key or by intercepting messages n of other legitimate users and then using the HA’s private key exclusive—or r can obtain the legitimate user’s identity IDMU and PWMU. In other words, this scheme does not provide anonymity. In 2006, however, Lee et al. [25] showed several security flaws in Zhu and Ma’s scheme and then improved it. Unfortunately, the HA still provided PWMU to the MU in the registration phase, enabling PWMU to be calculated. In 2008, Wan et al. [13] noted the security vulnerabilities of Lee et al.’s scheme and proposed an enhanced version of their scheme. However, in 2009, Chang and Lee [26] showed that Wu et al.’s improved scheme still did not provide anonymity, as they claimed. Recently, in 2012, Li [27] proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. This scheme’s main characteristic is that the MU chooses PWMU in the registration phase and sends it to the HA to perform other operations. Because the MU sends PWMU to the HA, this solves the IDMU and PWMU problems encountered in traditional schemes. Li’s scheme is more efficient in terms of performance because it uses a lightweight elliptic curve Diffie-Hellman computation compared with traditional schemes that use RSA (Ron Rivest, Adi Shamir, and Leonard Adlema) [28] with certificates. However, Li’s scheme has two weaknesses: (1) IDHA is transmitted using plaintext in the authentication phase and therefore an attacker can easily perform distributed denial-of-service attacks if IDHA is intercepted; and (2) there exist some issues in how the session key is generated in the roaming phase. Specifically, the details of session key management are not shown and are left unaddressed in Li’s scheme [27].
This study proposes an elliptic curve–based authentication scheme with roaming service and user anonymity for mobile communications that overcomes the weaknesses of Li’s scheme [27] and ensures fair load-sharing of the session key computation in the authentication phase.
The remainder of this paper is organized as follows: In Section 2, we review Li’s scheme and analyze its weaknesses. In Section 3, we propose an elliptic-curve-based authentication scheme with roaming service and user anonymity for mobile communications. In Section 4, we use BAN-logic (Burrows-Abadi-Needham logic) to demonstrate the security of our proposed scheme. In Section 5, we analyze our proposed scheme, and in Section 6, we compare it with other schemes. Finally, Section 7 presents the conclusions of our study.

2. Preliminaries

In this section, we review Li’s scheme [27]. His scheme consists of three phases: registration, authentication, and roaming, of which the authentication phase is real-time online.

2.1. Li’s Scheme

For simplicity, we list the common notations used throughout Li’s scheme in Table 1.
Table 1. Notations used throughout Li’s scheme.

2.1.1. Registration Phase

R1. MU→HA: mLR1{IDMU, H(PWMU⊕rn)}
The MU chooses the identity IDMU, password PWMU, and a random number rn; calculates H(PWMU⊕rn); and sends the registration request message {IDMU, H(PWMU⊕rn)} to the HA.
R2. HA→MU: mLR2{IDHA, Ep, E, n, P, PHA, z, H(.)}
When the registration request message {IDMU, H(PWMU⊕rn)} is received from the MU, the HA calculates H(IDMU||N) and z = H(PWMU⊕rn)⊕H(IDMU||N). Then, the HA sends IDHA, Ep, E, n, P, PHA, z, and H(.) to the MU.
R3. MU: IDHA, Ep, E, n, P, PHA, z, H(.)
After the message {IDHA, Ep, E, n, P, PHA, z, H(.)} is received from the HA, the MU stores this information along with rn onto the smart card. This completes the registration phase.

2.1.2. Authentication Phase

V1. MU→FA: mLV1{X, IND, c1, IDHA, TMU}
When the MU enters IDMU and PWMU, the smart card chooses a random number x and calculates X = xP, X1 = xPHA, Z = z⊕H(PWMU⊕rn), IND = IDMU⊕H(X1||TMU), and c1 = H(X1||Z). TMU is the MU’s current timestamp. Then, the MU sends the authentication request message {X, IND, c1, IDHA, TMU} to the FA.
V2. FA→HA: mLV2{X, IND, c1, Y, TMU, TFA, MACFA}
When the authentication message is received from the MU, the FA checks the validity of the timestamp TMU. If it is valid, FA chooses a random number y and calculates Y = yP and MACFA = H(X||IND||c1||Y||TMU||TFA||SKHF), where TFA is the FA’s current timestamp and SKHF is a session key between the HA and the FA. The FA then sends the message {X, IND, c1, Y, TMU, TFA, MACFA} to the HA.
V3. HA→FA: mLV3{MACHA, c’2 = c2⊕H(THA||SKHF), THA}
When the authentication message is received from the FA, the HA checks the validity of the timestamp TFA. If it is valid, the HA calculates H(X||IND||c1||Y||TMU||TFA||SKHF) and verifies whether H(X||IND||c1||Y||TMU||TFA||SKHF) is the same as the received MACFA. If it is not valid, the HA terminates the execution. Otherwise, the HA calculates X’1 = XN, ID’MU = IND⊕H(X’1||TMU), and c’1 = H(X’1||H(ID’MU||N)) and checks whether the equation c’1 = c1 holds. If it is not valid, the HA terminates the execution. Otherwise, the HA calculates MACHA = H(X||Y||IDFA||IDHA||THA||SKHF) and c2 = H(X’1||H(ID’MU||N)||X||Y||IDFA||IDHA), where THA is the HA’s current timestamp. The HA then sends the message {MACHA, c’2 = c2⊕H(THA||SKHF), THA} to the FA.
V4. FA→MU: mLV4{Y, c2, c3 = (TCertMU)sk}
When the message is received from the HA, the FA checks the validity of the timestamp THA. If it is valid, the FA calculates H(X||Y||IDFA||IDHA||THA||SKHF) and verifies whether H(X||Y||IDFA||IDHA||THA||SKHF) is the same as the received MACHA. If it is not valid, the FA terminates the execution. Otherwise, the FA believes that the HA is a valid home agent and the MU is an authenticated user. The FA then calculates c2 = c’2⊕H(THA||SKHF) and a session key sk = yX = xyP and sends the message {Y, c2, c3 = (TCertMU)sk} to the MU, where TCertMU is a temporary certificate for the MU.
V5. MU: Y, c2, c3 = (TCertMU)sk
When a message is received from the FA, the MU calculates H(X’1||H(ID’MU||N)||X||Y||IDFA||IDHA) and verifies whether it is the same as the received c2. If it is not valid, the MU terminates the execution. Otherwise, the MU believes that it is communicating with a legal FA. The MU subsequently calculates a session key sk’ = xY = xyP = sk and decrypts c3. Finally, the MU obtains TCertMU from the FA.

2.1.3. Roaming Phase

L1. MU→FA: mLRo1{mi, mac}
The MU calculates mi = (TCertMU||ski+1||Other)ski and mac = H(TCertMU||ski+1||Other) and sends the roaming message {mi, mac} to the FA, where ski+1 is a session key for the next communication.
L2. FA: mi, mac
When received the roaming message from the MU, the FA calculates the session key and decrypts mi. The FA then checks the validity of mac. If it is valid, the FA updates the session key ski with ski+1 for the next communication.

2.2. Advantages of Li’s Scheme

Li’s scheme has two advantages. First, the MU calculates H(PWMU⊕rn) and sends this message to HA. In other words, the MU chooses PWMU and sends it to the HA; this prevents PWMU from being calculated easily, which was a shortcoming of previous schemes. Second, Li’s scheme is more efficient in terms of performance because it uses the lightweight elliptic curve Diffie-Hellman computation compared with other traditional schemes that use heavyweight asymmetric cryptosystems with certificates.

2.3. Weaknesses of Li’s Scheme

Li’s scheme has two weaknesses. First, because IDHA is not properly hidden, an attacker can easily intercept it and determine the relationships among the MU, FA, and HA. In addition, it does not use an authentication mechanism between the MU and the FA, and therefore, for any message m1 to the FA, the FA performs the appropriate processing and transfers the results to HA. Because of this feature, the attacker can flood a specific target (HA), intercept other people’s message (m1) over the wireless network, and change the message timestamp TMU. Although the message will not be verified through the HA, the attacker can do enough to cripple a specific target host (HA), namely, the attacker can perform a distributed denial-of-service attack. Second, Li’s scheme does not clearly define or address some important issues, such as the assignment of session key computation during the roaming phase and how to manage the various session keys for a large number of users. If there are hundreds of thousands of people in a wireless network environment, and each person’s session key is different, managing the keys is not trivial. Table 2 shows a detailed description of the weaknesses of Li’s scheme [18].
Table 2. Weaknesses of Li’s scheme.

3. Proposed Scheme

The proposed scheme consists of three phases: registration, authentication, and roaming, of which the authentication phase is real-time online.

3.1. Notations

The proposed scheme uses the same notations as those in Table 1 and the new notations listed in Table 3.
Table 3. Additional notations.

3.2. Registration Phase

Figure 1 shows the registration phase of the proposed scheme. The detailed steps as follows.
Figure 1. Registration phase.
R1. MU→HA: mR1{IDMU, H2(PWMU⊕rn)}
The MU chooses IDMU, PWMU, and a random number rn and calculates H2(PWMU⊕rn). Then, the MU sends the message {IDMU, H2(PWMU⊕rn)} to the HA.
R2. HA→MU: mR2{IDHA, Ep, E, n, P, PHA, zi, H(.), Wi}
When the message H2(PWMU⊕rn) is received from the MU, the HA calculates zi = H2(PWMU⊕rn)⊕H1(IDMU||N||Wi)⊕H3(Wi). Then, the HA chooses a random number w, calculates Wi = wP, and transmits {IDHA, Ep, E, n, P, PHA, zi, Wi, H(.)} to the MU.
R3. MU: IDHA, Ep, E, n, P, PHA, zi, Wi, H(.)
The MU enters Wi into his/her smart card, and the MU’s smart card contains IDHA, Ep, E, n, P, PHA, zi, Wi, and H(.)

3.3. Authentication Phase

Figure 2 shows the authentication phase of the proposed scheme. The steps are detailed as follows.
Figure 2. Authentication phase.
V1. MU→FA: mV1{A, U}
The U inserts the smart card into the card reader and enters IDMU and PWMU. Then, the smart card chooses a random number x and calculates X = xP, X1 = xPHA, ZP = [zi⊕H2(PWMU⊕rn)⊕H3(Wi)]P, IND = IDMU⊕H1(X1||TMU), c1 = H(X1||Z), and A = aP, where TMU is the MU’s timestamp. Subsequently, the MU calculates a shared key EC = aY = ayP, the message U = (Wi, X, IND, c1, IDHA, TMU)EC, and sends an authentication request message {A, U} to the FA.
V2. FA→HA: mV2{Wi, X, IND, c1, Y, TMU, TFA, MACFA}
The FA calculates a shared key yA = ayP = EC and decrypts U by using EC to obtain Wi, X, IND, c1, Y, and TMU. Then, the FA checks the validity of the timestamp TMU. If it holds, the FA chooses a random number y and calculates Y = yP and MACFA = H1(Wi||X||IND||c1||Y||TMU||TFA||SKHF), where TFA is the FA’s current timestamp and SKHF is the session key between the HA and the FA. This key is mainly used for signature verification. The FA then sends the message {Wi, X, IND, c1, Y, TMU, TFA, MACFA} to the HA.
V3. HA→FA: mV3{MACHA, MAC’HA = MACHA⊕H1(THA||SKHF), THA}
The HA checks the validity of the timestamp TFA. If it is valid, the HA checks if the calculated value MAC’FA = H1(Wi||X|| IND||c1||Y||TMU||TFA||SKHF) is the same as the received MACFA. If it is not valid, the HA terminates the execution. Otherwise, the HA calculates X’1 = XN, ID’MU = IND⊕H1(X’1||TMU), and c’1 = H1(X’1||H1(ID’MU||N||Wi)) and checks whether the equation c’1 = c1 holds. If it is not valid, the HA terminates the execution. Otherwise, the HA calculates MACHA = H1(Wi||X||Y||IDFA||IDHA||THA||SKHF), where THA is the HA’s current timestamp. The HA then sends the message {MACHA, MAC’HA = MACHA⊕H1(THA||SKHF), THA} to the FA.
V4. FA→MU: mV4{c2 = (TCertMU)sk}
The HA checks the validity of the timestamp THA. If it is valid, the FA calculates MACHA = H1(Wi||X||Y||IDFA||IDHA||THA||SKHF) and verifies whether this value is the same as the received MACHA. If it is not valid, the FA terminates the execution. Otherwise, the FA believes that the MU is an authenticated user. The FA then calculates MACHA = MAC’HA⊕H1(THA||SKHF), Y = yP, and sk = yX = xyP and sends the message {c2 = (TCertMU)sk} to the MU, where TCertMU is a temporary certificate from the FA to the MU.
V5. MU: Y, c2 = (TCertMU)sk
The MU calculates a session key sk’ = xY = xyP = sk and decrypts c2. Finally, the MU obtains TCertMU from the FA.

3.4. Roaming Phase

Figure 3 shows the roaming phase of the proposed scheme. The steps are detailed as follows.
Figure 3. Roaming phase.
L1. MU→FA: mRo1{A, U}
The MU calculates mi = (TCertMU||ski+1||Other)ski, mac = H(TCertMU||ski+1||Other), and (mi||mac||ski||TMU)EC and sends the message {A, U} to the FA, where ski+1 is a session key for the next communication and TMU is the current timestamp.
L2. FA: A, U
The FA calculates aA = abP = EC and decrypts U to obtain mi, mac, ski, and TMU. The FA then checks the validity of TMU. If it is valid, the FA decrypts mi by using ski and calculates mac’ = H(TCertMU||ski+1||Other). If the equation mac’ = mac holds, the FA updates the session key ski with ski+1 for the next communication.

4. BAN-Logic Analysis

4.1. Introduction to BAN-Logic

BAN-logic is used to establish session key security between the MU and the FA to prove that the session key is safeguarded in the authentication phase of our scheme. The main process has four proofs:
  • MU believes the session key: MU←-SK-→FA
  • MU believes that FA believed the session key: MU←-SK-→FA
  • A believes the session key: MU←-SK-→FA
  • FA believes that MU believed the session key: MU←-SK-→FA
According to the BAN-logic characteristics of the security analysis, the following basic symbolic representation rules are used [29,30,31]:
  • (X, Y): X or Y is one part of the parameter (X, Y).
  • <X>Y: X can be obtained through the secret parameter Y.
  • {X}K: X is encrypted under the key K.
  • P←-K-→Q: P and Q may use the shared secret key K to communicate. The third party does not know the secret key K.
  • P<=S=>Q: S is only known between P and Q. P and Q must use S to prove the identity of each other.

4.2. Rules of BAN-Logic

Freshness rule: If part of the message is fresh, then the whole message is also fresh.
Message meaning rule: K is a key shared between P and Q; therefore, if P sees an encrypted message, it must come from Q.
Nonce verification rule: If P believes that Q once said X, then P believes that Q once believed X. If X is fresh, then Q should still hold this belief.
Jurisdiction rule: If P trusts Q as an authority on X, then P should believe X if Q does so.

4.3. Authentication Proof Based on BAN-logic

We use the rules of BAN-logic to represent the authentication phase in our proposed scheme and describe these messages as follows:
  • mV1. MU→FA: {(<IDMU>H1(X1||TMU), <X1, H1(IDMU||N||Wi)>H2(PWMU⊕rn), H3(Wi), Wi, X, IDHA)}EC
  • mV2. FA→HA: (<IDMU>H1(X1||TMU), <X1, H1(IDMU||N||Wi)>H2(PWMU⊕rn), H3(Wi), Wi, X, Y){Ri}SKHF
  • mV3. HA→FA: {(Wi, X, Y, IDHA, IDFA)} SKHF
  • mV4. FA→MU:{TCertMU}<MU←-SK-→FA>
To analyze our proposed scheme, we made the following assumptions without loss of generality:
A1: 
MU believes X.
A2: 
MU believes X1.
A3: 
MU believes A.
A4: 
FA believes Y.
A5: 
FA believes Ri.
A6: 
HA believes Wi.
A7: 
MU believes MU<=H(N)=>HA.
A8: 
HA believes MU<=H(N)=>HA.
A9: 
FA believes FA <=SKHF=>HA.
A10: 
HA believes FA <=SKHF=>HA.
A11: 
MU believes MU←-SK-→FA.
A12: 
FA believes (MU controls MU←-SK-→FA).
A13: 
HA believes (MU controls MU←-SK-→FA).
A14: 
HA believes (MU controls IDMU).
A15: 
IDMU is known only to user.
A16: 
MU believes TCertMU.
A17: 
MU believes IDMU.
A18: 
FA believes IDFA.
A19: 
HA believes IDHA.
We show the processes of the proofs as follows:
  • By mV1, A3, and A4, we apply the freshness rule to derive
    FA believes (<IDMU>H1(X1||TMU), <X1, H1(IDMU||N||Wi)>H2(PWMU⊕rn), H3(Wi), Wi, X, IDHA).
  • By mV1, A1, and A6, we apply the nonce verification rule to derive
    FA believes that MU said (<IDMU>H1(X1||TMU), <X1, H1(IDMU||N||Wi)>H2(PWMU⊕rn), H3(Wi), IDHA).
  • By mV2 and A10, we apply the message meaning rule to derive
    HA believes that FA said (<IDMU>H1(X1||TMU), <X1, H1(IDMU||N||Wi)>H2(PWMU⊕rn), H3(Wi), Wi, X, Y){Ri}.
  • By mV2, A1, A4, A5, and A6, we apply the nonce verification rule to derive
    HA believes that FA believes (<IDMU>H1(X1||TMU), <X1, H1(IDMU||N||Wi)>H2(PWMU⊕rn), H3(Wi)).
  • By Statement 4, we break the conjunction to obtain
    HA believes that FA believes <IDMU>H1(X1||TMU).
    HA believes that FA believes <X1, H1(IDMU||N||Wi)>H2(PWMU⊕rn), H3(Wi).
  • By Statement 5 and A2, we apply the message meaning rule and nonce verification rule to derive
    HA believes that MU believes IDMU.
  • By Statement 7 and A14, we apply the jurisdiction rule to obtain
    HA believes IDMU.
  • By Statement 8 and A15, we break the conjunction to obtain
    HA believes MU<=IDMU=>HA.
  • By mV3 and A9, we apply the message meaning rule to derive
    FA believes that HA said (Wi, X, Y, IDHA, IDFA).
  • By Statement 10, A1, A4, A5, and A6, we apply the nonce verification rule to derive
    FA believes that HA believes (IDHA, IDFA).
  • By Statement 11 and A18, we break the conjunction to obtain
    FA believes that HA believes IDHA.
  • By Statement 12, we apply the jurisdiction rule to obtain
    FA believes IDHA.
  • By mV3, A1, A4, and A12, we break the conjunction to obtain
    FA believes that MU believes <MU←-SK-→FA>.
  • By Statement 14, we apply the jurisdiction rule to obtain
    FA believes <MU←-SK-→FA>.
  • By mV4 and A16, we break the conjunction to obtain
    MU believes that FA believes <MU←-SK-→FA>.
  • By Statement 14, 15, 16, and A11, we prove that the process of setting the session key is safe between the MU and the FA.
From the foregoing analysis, we can find a consistent result with assumption A11 and Statement 16. Therefore, this indicates that Assumption A11 is established, and this also proves that the process of setting the session key is safe between the MU and the FA in our proposed scheme.

5. Security Analysis

In the authentication phase of our proposed scheme, we improved the session key IDHA by using symmetric encryption computation, compared with Li’s scheme that does not perform any encryption protection. Therefore, the anonymity level of the proposed scheme is even stronger than that of Li’s scheme. In other words, the security level increased from C2 to C3 (in [13], the C2 level means that the FA does not know the identity of the anonymous user, and the C3 level means that the attacker does not know the relationship among the MU, FA and HA) Hence, the attacker cannot intercept IDHA and cannot use replay attacks to paralyze the HA. In addition, for the problem of generating the session key in the roaming phase, our approach lets the MU encrypt the calculated session key by using the shared key EC and transmits it to the FA. Therefore, no problems are encountered during transmission. The FA does not need to recalculate the session key, and therefore, the amount of computation is reduced because there is no additional matching of session keys to individual MUs. Finally, the computation of the session key is balanced between the sender and the receiver in the authentication phase. In this section, we show that the proposed scheme can withstand some possible attacks and affords several good security properties.

5.1. Resist Replay Attack

The proposed scheme has a timestamp in each transmission process, including the authentication (V1→V5) and roaming (L1→L2) phases. In addition, V1 and L1 are encrypted by using the shared key EC, and therefore, we can imagine that V1 and L1 are secure channels. Therefore, even if an attacker intercepts the message, the message cannot be broken in this secure channel. This allows our proposed scheme to resist replay attacks.

5.2. Resist Distributed Denial-of-Service Attack

The attacker can intercept the cipher text of message m1 that contains the timestamp TMU and IDHA. However, the attacker cannot decrypt the cipher text and cannot forge the timestamp TMU and specific object IDHA. Then, the attacker cannot use a distributed denial-of-service attack to attack the HA.

5.3. Achieve High Level of Anonymity

In a wireless environment, messages can be intercepted easily. In [27], the MU sends the authentication message m1 to the FA in the authentication phase. The message content is not encrypted, and therefore, the attacker easily intercepts IDHA and then determines the relationship among the MA, FA, and HA. When the relationship is known, the level of anonymity of the entire scheme is lowered, and the attacker can successfully use the attacks described in Section 4.2 and Section 4.3. In our proposed scheme, when the MU wants to send the message to the FA, it will calculate the shared key EC and then encrypt the message by using EC to achieve the security and integrity requirements. Only the FA possesses the EC, and therefore, other people cannot decrypt this cipher text. Therefore, our scheme can achieve the C3 level requirement of high anonymity.

5.4. Solve Corresponding Problem of Session Key in Roaming Phase

In Li’s scheme, when the FA receives the roaming message, it calculates the session key, decrypts the cipher text mi, and performs a comparison with mac. However, there are in fact hundreds of thousands of people in a wireless network environment, and Li’s scheme did not clearly discuss how to calculate the session key in the roaming phase. Each person’s session key is not the same, and it did not clarify how to calculate one hundred thousand different session keys or save them in the table. It can be saved as a form, but this may pose some risks, which need to be discussed further. In the proposed scheme, the FA can decrypt the cipher text mi by using the session key calculated by the MU in the authentication phase. On the other hand, we encrypt the session key by using EC calculated by the MU in the authentication phase. In this manner, our scheme resists data disclosure to attackers, who intercept the session key during the transfer processes. Even if the message is intercepted, it can only reveal the cipher text. Therefore, the proposed scheme solves the corresponding problem of the session key.

5.5. Balanced Calculation of Session Key

The load of session key computation is balanced between the senders and the receivers in the authentication phase. Table 4 shows the balanced calculation of the session key.
Table 4. Balanced calculation of the session key.

7. Conclusions

This study proposes an elliptic-curve-based authentication scheme with roaming service and user anonymity for mobile communication. It overcomes the weaknesses of Li’s scheme [27] and provides balanced session key computation in the authentication phase. We use an elliptic curve in the calculations, and therefore, the security performance is good. Although our computational complexity is comparable to that of Li’s scheme, our scheme reduces the load of MU calculation by moving this calculation to the HA, which has better computing performance. Finally, the advantages and weaknesses of our scheme are compared with those of other related works, and it demonstrates improved security, anonymity, and resistance to attacks without having additional computational complexity.

Acknowledgments

This work was supported by MOST 105-2221-E-145-002.

Author Contributions

Kai Chain, Wen-Chung Kuo and Jiin-Chiou Cheng conceived and designed the experiments; Kai Chain and Wen-Chung Kuo performed the experiments and analyzed the data; Kai Chain wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, K.H.; Li, J.S.; Wang, C.Y.; Chilamkurti, N.; Vasilakos, A.V. Minimizing multiplayer interactive delay in multihop wireless networks. Int. J. Commun. Syst. 2012, 25, 1330–1349. [Google Scholar] [CrossRef]
  2. Vavoulas, A.; Vaiopoulos, N.; Varoutas, D.A.; Chipouras, A.; Stefanou, G. Performance improvement of fixed wireless access networks by conjunction of dual polarization and time domain radio resource allocation technique. Int. J. Commun. Syst. 2011, 24, 483–491. [Google Scholar] [CrossRef]
  3. Li, J.S.; Liu, K.H. A hidden mutual authentication protocol for low-cost RFID tags. Int. J. Commun. Syst. 2011, 24, 1196–1211. [Google Scholar] [CrossRef]
  4. Tang, H.B.; Liu, X.S. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. Int. J. Commun. Syst. 2012, 25, 1639–1644. [Google Scholar] [CrossRef]
  5. Buttyan, L.; Gbaguidi, C.; Staamann, S.; Wilhelm, U. Extensions to an authentication technique proposed for the global mobility network. IEEE Trans. Commun. 2000, 48, 373–376. [Google Scholar] [CrossRef]
  6. Hwang, K.F.; Chang, C.C. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans. Wirel. Commun. 2003, 2, 400–407. [Google Scholar] [CrossRef]
  7. Tzeng, Z.J.; Tzeng, W.G. Authentication of mobile users in third generation mobile system. Wirel. Pers. Commun. 2001, 16, 35–50. [Google Scholar] [CrossRef]
  8. Suzukiz, S.; Nakada, K. An authentication technique based on distributed security management for the global mobility network. IEEE J. Sel. Areas Commun. 1997, 15, 1608–1617. [Google Scholar] [CrossRef]
  9. Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
  10. Lee, C.Y.; Chang, C.C.; Lin, C.H. User authentication with anonymity for global mobility networks. In Proceedings of the IEEE Mobility Conference 2005: The Second Asia Pacific Conference on Mobile Technology, Applications and Systems, Guangzhou, China, 15–17 November 2005.
  11. Lin, C.H.; Lee, C.Y. Cryptanalysis of a new authentication scheme with anonymity for wireless environments. In Proceedings of the Second International Conference on Advances in Mobile Multimedia, Bali, Indonesia, 22–24 September 2004; pp. 399–402.
  12. Li, C.T. Secure smart card based password authentication scheme with user anonymity. Inf. Technol. Control 2011, 40, 157–162. [Google Scholar] [CrossRef]
  13. Wan, Z.; Ren, K.; Preneel, B. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. In Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA, 31 March–2 April 2008; pp. 62–67.
  14. Chen, C.L.; Lee, C.C.; Hsu, C.Y. Mobile device integration of a fingerprint biometric remote authentication scheme. Int. J. Commun. Syst. 2012, 25, 585–597. [Google Scholar] [CrossRef]
  15. Chuang, Y.H.; Tseng, Y.M. Towards generalized ID-based user authentication for mobile multi-server environment. Int. J. Commun. Syst. 2012, 25, 447–460. [Google Scholar] [CrossRef]
  16. Xie, Q. A new authenticated key agreement for session initiation protocol. Int. J. Commun. Syst. 2012, 25, 47–54. [Google Scholar] [CrossRef]
  17. Argyroudis, P.G.; Verma, R.; Tewari, H.; O’Mahony, D. Performance analysis of cryptographic protocols on handheld devices. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA2004), Cambridge, MA, USA, 2004; pp. 169–174.
  18. Chen, B.L.; Kuo, W.C.; Wuu, L.C. Robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 2014, 27, 377–389. [Google Scholar] [CrossRef]
  19. Doomun, M.R.; Soyjaudah, K.S.; Bundhoo, D. Energy consumption and computational analysis of Rijndael-AES. In Proceedings of the Third IEEE International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks (ICI 2007), Tashkent, Uzbekistan, 26–28 September 2007; pp. 1–6.
  20. Passing, M.; Dressler, F. Experimental performance evaluation of cryptographic algorithms. In Proceedings of the 3rd IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Vancouver, BC, Canada, 9–12 June 2006; pp. 882–887.
  21. Passing, M.; Dressler, F. Practical evaluation of the performance impact of security mechanisms in sensor networks. In Proceedings of the 31st IEEE Conference on Local Computer Networks, Tampa, FL, USA, 14–17 November 2006; pp. 623–629.
  22. Syverson, P. A taxonomy of replay attacks. In Proceedings of the 7th IEEE Computer Security Foundations Workshop, Franconia, NH, USA, 14–16 June 1994; pp. 131–136.
  23. Wong, D.S.; Fuentes, H.H.; Chan, A.H. The performance measurement of cryptographic primitives on palm devices. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, LA, USA, 10–14 December 2001; pp. 92–101.
  24. Zhu, J.; Ma, J. A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electron. 2004, 50, 230–234. [Google Scholar]
  25. Lee, C.C.; Hwang, M.S.; Liao, I.E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 2006, 53, 1683–1687. [Google Scholar] [CrossRef]
  26. Lee, J.S.; Chang, J.H.; Lee, D.H. Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 2009, 13, 292–293. [Google Scholar]
  27. Li, C.T. A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. Inf. Technol. Control 2012, 41, 69–76. [Google Scholar] [CrossRef]
  28. Rivest, R.L.; Shamir, A.; Adleman, L.M. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  29. Deng, Y. Based on BAN logic analysis otway-rees protocol. Chaohu Coll. J. 2006, 78, 36–37. [Google Scholar]
  30. Li, T.; Liu, X.; Qin, Z. Formal analysis for security of otway-rees protocol with BAN-logic. In Proceedings of the First International Workshop on Database Technology and Applications, Wuhan, Hubei, 25–26 April 2009; pp. 590–593.
  31. Li, T.; Liu, X.; Qin, Z.; Zhang, X. An improved security protocol formal analysis with BAN-logic. In Proceedings of the International Conference on Electronic Commerce and Business Intelligence, Beijing, China, 6–7 June 2009; pp. 102–105.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.