Next Article in Journal
Probability of Interference-Optimal and Energy-Efficient Analysis for Topology Control in Wireless Sensor Networks
Next Article in Special Issue
Seismic Responses of a Cable-Stayed Bridge with Consideration of Uniform Temperature Load
Previous Article in Journal
A Novel Hybrid Semi-Active Mass Damper Configuration for Structural Applications
Previous Article in Special Issue
A Study on the Design of the Top Flange of a Modular T-Girder Bridge Using the Limit State Design Method
Open AccessArticle

A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

1
Department of Computer and Information Science, Republic of China Military Academy, Kaohsiung 83059, Taiwan
2
Department of Computer Science and Information Engineering, National Yunlin University of Science & Technology, Number 123 University Road, Section 3, Douliou, Yunlin 64002, Taiwan
3
Department of Computer Science and Information Engineering, Southern Taiwan University of Science and Technology, Tainan 71005, Taiwan
*
Author to whom correspondence should be addressed.
Academic Editors: Wen-Hsiang Hsieh and Christos Bouras
Appl. Sci. 2016, 6(12), 393; https://doi.org/10.3390/app6120393
Received: 13 September 2016 / Revised: 5 November 2016 / Accepted: 24 November 2016 / Published: 30 November 2016
Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic) is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity. View Full-Text
Keywords: roaming; anonymity; mutual authentication; elliptic curve discrete logarithm problem; wireless networks; BAN-logic roaming; anonymity; mutual authentication; elliptic curve discrete logarithm problem; wireless networks; BAN-logic
Show Figures

Figure 1

MDPI and ACS Style

Chain, K.; Kuo, W.-C.; Cheng, J.-C. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity. Appl. Sci. 2016, 6, 393.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map

1
Back to TopTop