Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/9717
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Madhusudhan, R. | |
dc.contributor.author | Shashidhara, R. | |
dc.date.accessioned | 2020-03-31T06:51:20Z | - |
dc.date.available | 2020-03-31T06:51:20Z | - |
dc.date.issued | 2019 | |
dc.identifier.citation | Arabian Journal for Science and Engineering, 2019, Vol., , pp.- | en_US |
dc.identifier.uri | 10.1007/s13369-019-04246-2 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/9717 | - |
dc.description.abstract | Mobile user authentication is very crucial to ensure the authenticity and privacy of roaming users in mobility environments. The existing communication technologies are highly vulnerable to security threats and pose a great challenge for the wireless networks being used today. Because the mode of a wireless channel is open, these networks do not carry any inherent security and hence are more prone to threats. Consequently, designing a robust scheme for roaming service in the mobile environment is always challenging. Recently, Kuo et al. proposed an efficient authentication protocol for roaming and they claimed that the protocol can resist several security threats in mobile networks. In this paper, we analyze the security of Kuo et al. s. authentication protocol and show that the protocol is exposed to an insider attack, replay attack, denial-of-service attack and cannot provide fair key agreement, user untraceability, and local password verification. To combat these security flaws, we propose a secure authentication scenario for roaming service using elliptic curve cryptosystem. The proposed authentication protocol is implemented in HLPSL language using automated validation of internet security protocols and applications as a formal verification tool to prove that the novel protocol is free from known attacks. Further, we applied Burrows Abadi Needham logic to validate the correctness of the authentication system. The proposed protocol not only improves security but also retains a low communicational and computational overhead. 2019, King Fahd University of Petroleum & Minerals. | en_US |
dc.title | A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments | en_US |
dc.type | Article | en_US |
Appears in Collections: | 1. Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.