A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks

dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.authoridhttps://orcid.org/0000-0001-8579-5444en_US
dc.authoridhttps://orcid.org/0000-0002-6784-3278en_US
dc.contributor.authorAlzahrani, Bander A.
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorAlsharif, Mohammed H.
dc.date.accessioned2020-05-18T00:14:09Z
dc.date.available2020-05-18T00:14:09Z
dc.date.issued2020en_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.descriptionDocument Information Language:English Accession Number: WOS:000521147600024en_US
dc.description.abstractThe roaming service enables a remote user to get desired services, while roaming in a foreign network through the help of his home network. The authentication is a pre-requisite for secure communication between a foreign network and the roaming user, which enables the user to share a secret key with foreign network for subsequent private communication of data. Sharing a secret key is a tedious task due to underneath open and insecure channel. Recently, a number of such schemes have been proposed to provide authentication between roaming user and the foreign networks. Very recently, Lu et al. claimed that the seminal Gopi-Hwang scheme fails to resist a session-specific temporary information leakage attack. Lu et al. then proposed an improved scheme based on Elliptic Curve Cryptography (ECC) for roaming user. However, contrary to their claim, the paper provides an in-depth cryptanalysis of Lu et al.'s scheme to show the weaknesses of their scheme against Stolen Verifier and Traceability attacks. Moreover, the analysis also affirms that the scheme of Lu et al. entails incorrect login and authentication phases and is prone to scalability issues. An improved scheme is then proposed. The scheme not only overcomes the weaknesses Lu et al.'s scheme but also incurs low computation time. The security of the scheme is analyzed through formal and informal methods; moreover, the automated tool ProVerif also verifies the security features claimed by the proposed scheme.en_US
dc.description.sponsorshipThis Project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, under Grant No. (RG-7-611-40). The author, therefore, gratefully acknowledge the DSR for technical and financial support.en_US
dc.identifier.doi10.3390/sym12020287en_US
dc.identifier.issn2073-8994
dc.identifier.issue2en_US
dc.identifier.scopus2-s2.0-85080856598en_US
dc.identifier.scopusqualityQ2en_US
dc.identifier.urihttps://hdl.handle.net/11363/2147
dc.identifier.urihttps://doi.org/
dc.identifier.volume12en_US
dc.identifier.wosWOS:000521147600024en_US
dc.identifier.wosqualityQ2en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherMDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLANDen_US
dc.relation.ispartofSYMMETRY-BASELen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectroaming useren_US
dc.subjectauthenticationen_US
dc.subjectinternet of thingsen_US
dc.subjectmobile networksen_US
dc.subjectanonymityen_US
dc.subjectelliptic curve cryptographyen_US
dc.subjectProVerifen_US
dc.subject2-FACTOR AUTHENTICATIONen_US
dc.subjectMUTUAL AUTHENTICATIONen_US
dc.subjectSERVICEen_US
dc.subjectANONYMITYen_US
dc.titleA Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networksen_US
dc.typeArticleen_US

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
symmetry-12-00287-v2.pdf
Boyut:
850.42 KB
Biçim:
Adobe Portable Document Format
Açıklama:
Makale / Article
Lisans paketi
Listeleniyor 1 - 1 / 1
Küçük Resim Yok
İsim:
license.txt
Boyut:
1.56 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: