Provably secure anonymous authentication scheme for roaming service in global mobility networks

Kuo Yan Wu, Kuo Y. Tsai, Tzong Che Wu, Kouichi Sakurai

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

This paper presents an anonymous authentication scheme for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity information of the mobile user who is sending the roaming request. In addition, the home agent does not have to maintain any verification table for authenticating the mobile user. We give formal analyses to show that our proposed scheme satisfies the security requirements of user anonymity, mutual authentication, session-key security, and perfect forward secrecy. Besides, some possible attacks on the proposed scheme are discussed, such as the replay attack, the man-in-middle attack, the impersonation attack, and the insider attack.

Original languageEnglish
Pages (from-to)727-742
Number of pages16
JournalJournal of Information Science and Engineering
Volume31
Issue number2
Publication statusPublished - Mar 1 2015

Fingerprint

Authentication
anonymity
secrecy

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Hardware and Architecture
  • Library and Information Sciences
  • Computational Theory and Mathematics

Cite this

Provably secure anonymous authentication scheme for roaming service in global mobility networks. / Wu, Kuo Yan; Tsai, Kuo Y.; Wu, Tzong Che; Sakurai, Kouichi.

In: Journal of Information Science and Engineering, Vol. 31, No. 2, 01.03.2015, p. 727-742.

Research output: Contribution to journalArticle

@article{8cb7f5c07d334a01b5539a0b0e1dec52,
title = "Provably secure anonymous authentication scheme for roaming service in global mobility networks",
abstract = "This paper presents an anonymous authentication scheme for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity information of the mobile user who is sending the roaming request. In addition, the home agent does not have to maintain any verification table for authenticating the mobile user. We give formal analyses to show that our proposed scheme satisfies the security requirements of user anonymity, mutual authentication, session-key security, and perfect forward secrecy. Besides, some possible attacks on the proposed scheme are discussed, such as the replay attack, the man-in-middle attack, the impersonation attack, and the insider attack.",
author = "Wu, {Kuo Yan} and Tsai, {Kuo Y.} and Wu, {Tzong Che} and Kouichi Sakurai",
year = "2015",
month = "3",
day = "1",
language = "English",
volume = "31",
pages = "727--742",
journal = "Journal of Information Science and Engineering",
issn = "1016-2364",
publisher = "Institute of Information Science",
number = "2",

}

TY - JOUR

T1 - Provably secure anonymous authentication scheme for roaming service in global mobility networks

AU - Wu, Kuo Yan

AU - Tsai, Kuo Y.

AU - Wu, Tzong Che

AU - Sakurai, Kouichi

PY - 2015/3/1

Y1 - 2015/3/1

N2 - This paper presents an anonymous authentication scheme for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity information of the mobile user who is sending the roaming request. In addition, the home agent does not have to maintain any verification table for authenticating the mobile user. We give formal analyses to show that our proposed scheme satisfies the security requirements of user anonymity, mutual authentication, session-key security, and perfect forward secrecy. Besides, some possible attacks on the proposed scheme are discussed, such as the replay attack, the man-in-middle attack, the impersonation attack, and the insider attack.

AB - This paper presents an anonymous authentication scheme for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity information of the mobile user who is sending the roaming request. In addition, the home agent does not have to maintain any verification table for authenticating the mobile user. We give formal analyses to show that our proposed scheme satisfies the security requirements of user anonymity, mutual authentication, session-key security, and perfect forward secrecy. Besides, some possible attacks on the proposed scheme are discussed, such as the replay attack, the man-in-middle attack, the impersonation attack, and the insider attack.

UR - http://www.scopus.com/inward/record.url?scp=84928945375&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84928945375&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84928945375

VL - 31

SP - 727

EP - 742

JO - Journal of Information Science and Engineering

JF - Journal of Information Science and Engineering

SN - 1016-2364

IS - 2

ER -