A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
With the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the inf...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-05-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/10/3565 |
id |
doaj-177759f3da97442387622359b78d7a52 |
---|---|
record_format |
Article |
spelling |
doaj-177759f3da97442387622359b78d7a522020-11-25T03:10:57ZengMDPI AGApplied Sciences2076-34172020-05-01103565356510.3390/app10103565A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility NetworksSungJin Yu0JoonYoung Lee1YoHan Park2YoungHo Park3SangWoo Lee4BoHeung Chung5School of Electronics Engineering, Kyungpook National University, Daegu 41566, KoreaSchool of Electronics Engineering, Kyungpook National University, Daegu 41566, KoreaSchool of Computer Engineering, Keimyung University, Daegu 42601, KoreaSchool of Electronics Engineering, Kyungpook National University, Daegu 41566, KoreaElectronics and Telecommunications Research Institute, Daejeon 34129, KoreaElectronics and Telecommunications Research Institute, Daejeon 34129, KoreaWith the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the information is transmitted over an open channel. Thus, secure and efficient authentication protocols are essential to provide secure roaming services for legitimate users. In 2018, Madhusudhan et al. presented a secure authentication protocol for global mobile networks. However, we demonstrated that their protocol could not prevent potential attacks, including masquerade, session key disclosure, and replay attacks. Thus, we proposed a secure and efficient three-factor authentication protocol to overcome the security weaknesses of Madhusudhan et al.’s scheme. The proposed scheme was demonstrated to prevent various attacks and provided a secure mutual authentication by utilizing biometrics and secret parameters. We evaluated the security of the proposed protocol using informal security analysis and formal security analysis, such as the real-or-random (ROR) model and Burrows–Abadi–Needham (BAN) logic. In addition, we showed that our scheme withstands man-in-the-middle (MITM) and replay attacks utilizing formal security validation automated validation of internet security protocols and applications (AVISPA) simulation. Finally, we compared the performance of our protocol with existing schemes. Consequently, our scheme ensured better security and efficiency features than existing schemes and can be suitable for resource-constrained mobile environments.https://www.mdpi.com/2076-3417/10/10/3565authenticationglobal mobility networksroaming serviceBAN logicROR modelAVISPA simulation |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
SungJin Yu JoonYoung Lee YoHan Park YoungHo Park SangWoo Lee BoHeung Chung |
spellingShingle |
SungJin Yu JoonYoung Lee YoHan Park YoungHo Park SangWoo Lee BoHeung Chung A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks Applied Sciences authentication global mobility networks roaming service BAN logic ROR model AVISPA simulation |
author_facet |
SungJin Yu JoonYoung Lee YoHan Park YoungHo Park SangWoo Lee BoHeung Chung |
author_sort |
SungJin Yu |
title |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks |
title_short |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks |
title_full |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks |
title_fullStr |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks |
title_full_unstemmed |
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks |
title_sort |
secure and efficient three-factor authentication protocol in global mobility networks |
publisher |
MDPI AG |
series |
Applied Sciences |
issn |
2076-3417 |
publishDate |
2020-05-01 |
description |
With the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the information is transmitted over an open channel. Thus, secure and efficient authentication protocols are essential to provide secure roaming services for legitimate users. In 2018, Madhusudhan et al. presented a secure authentication protocol for global mobile networks. However, we demonstrated that their protocol could not prevent potential attacks, including masquerade, session key disclosure, and replay attacks. Thus, we proposed a secure and efficient three-factor authentication protocol to overcome the security weaknesses of Madhusudhan et al.’s scheme. The proposed scheme was demonstrated to prevent various attacks and provided a secure mutual authentication by utilizing biometrics and secret parameters. We evaluated the security of the proposed protocol using informal security analysis and formal security analysis, such as the real-or-random (ROR) model and Burrows–Abadi–Needham (BAN) logic. In addition, we showed that our scheme withstands man-in-the-middle (MITM) and replay attacks utilizing formal security validation automated validation of internet security protocols and applications (AVISPA) simulation. Finally, we compared the performance of our protocol with existing schemes. Consequently, our scheme ensured better security and efficiency features than existing schemes and can be suitable for resource-constrained mobile environments. |
topic |
authentication global mobility networks roaming service BAN logic ROR model AVISPA simulation |
url |
https://www.mdpi.com/2076-3417/10/10/3565 |
work_keys_str_mv |
AT sungjinyu asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT joonyounglee asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT yohanpark asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT younghopark asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT sangwoolee asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT boheungchung asecureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT sungjinyu secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT joonyounglee secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT yohanpark secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT younghopark secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT sangwoolee secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks AT boheungchung secureandefficientthreefactorauthenticationprotocolinglobalmobilitynetworks |
_version_ |
1724656141633323008 |