AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this ca...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9454484/ |
id |
doaj-44b614fe05684cea9b067067cb571b52 |
---|---|
record_format |
Article |
spelling |
doaj-44b614fe05684cea9b067067cb571b522021-06-29T23:00:20ZengIEEEIEEE Access2169-35362021-01-019882568827110.1109/ACCESS.2021.30891029454484AMAPG: Advanced Mobile Authentication Protocol for GLOMONETAmir Masoud Rahmani0Mokhtar Mohammadi1Jan Lansky2https://orcid.org/0000-0003-2485-1494Stanislava Mildeova3https://orcid.org/0000-0003-1234-9130Masoumeh Safkhani4https://orcid.org/0000-0002-1897-0828Saru Kumari5https://orcid.org/0000-0003-4929-5383Sarkhel H. Taher Karim6Mehdi Hosseinzadeh7https://orcid.org/0000-0003-1088-4551Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, TaiwanDepartment of Information Technology, College of Engineering and Computer Science, Lebanese French University, KR-IraqDepartment of Computer Science and Mathematics, Faculty of Economic Studies, University of Finance and Administration, Prague, Czech RepublicDepartment of Computer Science and Mathematics, Faculty of Economic Studies, University of Finance and Administration, Prague, Czech RepublicComputer Engineering Department, Shahid Rajaee Teacher Training University, Tehran, IranDepartment of Mathematics, Chaudhary Charan Singh University, Meerut, IndiaComputer Department, College of Science, University of Halabja, Halabja, IraqPattern Recognition and Machine Learning Lab, Gachon University, Sujeonggu, Seongnam, Republic of KoreaRoaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara <italic>et al.</italic> recently reported security vulnerabilities of Xu <italic>et al.</italic>’s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG’s security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols.https://ieeexplore.ieee.org/document/9454484/Global mobility networkroamingstolen smart card attacktraceability attackimpersonation attackScyther |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Amir Masoud Rahmani Mokhtar Mohammadi Jan Lansky Stanislava Mildeova Masoumeh Safkhani Saru Kumari Sarkhel H. Taher Karim Mehdi Hosseinzadeh |
spellingShingle |
Amir Masoud Rahmani Mokhtar Mohammadi Jan Lansky Stanislava Mildeova Masoumeh Safkhani Saru Kumari Sarkhel H. Taher Karim Mehdi Hosseinzadeh AMAPG: Advanced Mobile Authentication Protocol for GLOMONET IEEE Access Global mobility network roaming stolen smart card attack traceability attack impersonation attack Scyther |
author_facet |
Amir Masoud Rahmani Mokhtar Mohammadi Jan Lansky Stanislava Mildeova Masoumeh Safkhani Saru Kumari Sarkhel H. Taher Karim Mehdi Hosseinzadeh |
author_sort |
Amir Masoud Rahmani |
title |
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET |
title_short |
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET |
title_full |
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET |
title_fullStr |
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET |
title_full_unstemmed |
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET |
title_sort |
amapg: advanced mobile authentication protocol for glomonet |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2021-01-01 |
description |
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara <italic>et al.</italic> recently reported security vulnerabilities of Xu <italic>et al.</italic>’s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG’s security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols. |
topic |
Global mobility network roaming stolen smart card attack traceability attack impersonation attack Scyther |
url |
https://ieeexplore.ieee.org/document/9454484/ |
work_keys_str_mv |
AT amirmasoudrahmani amapgadvancedmobileauthenticationprotocolforglomonet AT mokhtarmohammadi amapgadvancedmobileauthenticationprotocolforglomonet AT janlansky amapgadvancedmobileauthenticationprotocolforglomonet AT stanislavamildeova amapgadvancedmobileauthenticationprotocolforglomonet AT masoumehsafkhani amapgadvancedmobileauthenticationprotocolforglomonet AT sarukumari amapgadvancedmobileauthenticationprotocolforglomonet AT sarkhelhtaherkarim amapgadvancedmobileauthenticationprotocolforglomonet AT mehdihosseinzadeh amapgadvancedmobileauthenticationprotocolforglomonet |
_version_ |
1721354194381701120 |