A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks

With the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the inf...

Full description

Bibliographic Details
Main Authors: SungJin Yu, JoonYoung Lee, YoHan Park, YoungHo Park, SangWoo Lee, BoHeung Chung
Format: Article
Language:English
Published: MDPI AG 2020-05-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/10/3565
id doaj-177759f3da97442387622359b78d7a52
record_format Article
spelling doaj-177759f3da97442387622359b78d7a522020-11-25T03:10:57ZengMDPI AGApplied Sciences2076-34172020-05-01103565356510.3390/app10103565A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility NetworksSungJin Yu0JoonYoung Lee1YoHan Park2YoungHo Park3SangWoo Lee4BoHeung Chung5School of Electronics Engineering, Kyungpook National University, Daegu 41566, KoreaSchool of Electronics Engineering, Kyungpook National University, Daegu 41566, KoreaSchool of Computer Engineering, Keimyung University, Daegu 42601, KoreaSchool of Electronics Engineering, Kyungpook National University, Daegu 41566, KoreaElectronics and Telecommunications Research Institute, Daejeon 34129, KoreaElectronics and Telecommunications Research Institute, Daejeon 34129, KoreaWith the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the information is transmitted over an open channel. Thus, secure and efficient authentication protocols are essential to provide secure roaming services for legitimate users. In 2018, Madhusudhan et al. presented a secure authentication protocol for global mobile networks. However, we demonstrated that their protocol could not prevent potential attacks, including masquerade, session key disclosure, and replay attacks. Thus, we proposed a secure and efficient three-factor authentication protocol to overcome the security weaknesses of Madhusudhan et al.’s scheme. The proposed scheme was demonstrated to prevent various attacks and provided a secure mutual authentication by utilizing biometrics and secret parameters. We evaluated the security of the proposed protocol using informal security analysis and formal security analysis, such as the real-or-random (ROR) model and Burrows–Abadi–Needham (BAN) logic. In addition, we showed that our scheme withstands man-in-the-middle (MITM) and replay attacks utilizing formal security validation automated validation of internet security protocols and applications (AVISPA) simulation. Finally, we compared the performance of our protocol with existing schemes. Consequently, our scheme ensured better security and efficiency features than existing schemes and can be suitable for resource-constrained mobile environments.https://www.mdpi.com/2076-3417/10/10/3565authenticationglobal mobility networksroaming serviceBAN logicROR modelAVISPA simulation
collection DOAJ
language English
format Article
sources DOAJ
author SungJin Yu
JoonYoung Lee
YoHan Park
YoungHo Park
SangWoo Lee
BoHeung Chung
spellingShingle SungJin Yu
JoonYoung Lee
YoHan Park
YoungHo Park
SangWoo Lee
BoHeung Chung
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
Applied Sciences
authentication
global mobility networks
roaming service
BAN logic
ROR model
AVISPA simulation
author_facet SungJin Yu
JoonYoung Lee
YoHan Park
YoungHo Park
SangWoo Lee
BoHeung Chung
author_sort SungJin Yu
title A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
title_short A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
title_full A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
title_fullStr A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
title_full_unstemmed A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
title_sort secure and efficient three-factor authentication protocol in global mobility networks
publisher MDPI AG
series Applied Sciences
issn 2076-3417
publishDate 2020-05-01
description With the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the information is transmitted over an open channel. Thus, secure and efficient authentication protocols are essential to provide secure roaming services for legitimate users. In 2018, Madhusudhan et al. presented a secure authentication protocol for global mobile networks. However, we demonstrated that their protocol could not prevent potential attacks, including masquerade, session key disclosure, and replay attacks. Thus, we proposed a secure and efficient three-factor authentication protocol to overcome the security weaknesses of Madhusudhan et al.’s scheme. The proposed scheme was demonstrated to prevent various attacks and provided a secure mutual authentication by utilizing biometrics and secret parameters. We evaluated the security of the proposed protocol using informal security analysis and formal security analysis, such as the real-or-random (ROR) model and Burrows–Abadi–Needham (BAN) logic. In addition, we showed that our scheme withstands man-in-the-middle (MITM) and replay attacks utilizing formal security validation automated validation of internet security protocols and applications (AVISPA) simulation. Finally, we compared the performance of our protocol with existing schemes. Consequently, our scheme ensured better security and efficiency features than existing schemes and can be suitable for resource-constrained mobile environments.
topic authentication
global mobility networks
roaming service
BAN logic
ROR model
AVISPA simulation
url https://www.mdpi.com/2076-3417/10/10/3565
work_keys_str_mv AT sungjinyu asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT joonyounglee asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT yohanpark asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT younghopark asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT sangwoolee asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT boheungchung asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT sungjinyu secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT joonyounglee secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT yohanpark secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT younghopark secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT sangwoolee secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
AT boheungchung secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks
_version_ 1724656141633323008