AMAPG: Advanced Mobile Authentication Protocol for GLOMONET

Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this ca...

Full description

Bibliographic Details
Main Authors: Amir Masoud Rahmani, Mokhtar Mohammadi, Jan Lansky, Stanislava Mildeova, Masoumeh Safkhani, Saru Kumari, Sarkhel H. Taher Karim, Mehdi Hosseinzadeh
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9454484/
id doaj-44b614fe05684cea9b067067cb571b52
record_format Article
spelling doaj-44b614fe05684cea9b067067cb571b522021-06-29T23:00:20ZengIEEEIEEE Access2169-35362021-01-019882568827110.1109/ACCESS.2021.30891029454484AMAPG: Advanced Mobile Authentication Protocol for GLOMONETAmir Masoud Rahmani0Mokhtar Mohammadi1Jan Lansky2https://orcid.org/0000-0003-2485-1494Stanislava Mildeova3https://orcid.org/0000-0003-1234-9130Masoumeh Safkhani4https://orcid.org/0000-0002-1897-0828Saru Kumari5https://orcid.org/0000-0003-4929-5383Sarkhel H. Taher Karim6Mehdi Hosseinzadeh7https://orcid.org/0000-0003-1088-4551Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, TaiwanDepartment of Information Technology, College of Engineering and Computer Science, Lebanese French University, KR-IraqDepartment of Computer Science and Mathematics, Faculty of Economic Studies, University of Finance and Administration, Prague, Czech RepublicDepartment of Computer Science and Mathematics, Faculty of Economic Studies, University of Finance and Administration, Prague, Czech RepublicComputer Engineering Department, Shahid Rajaee Teacher Training University, Tehran, IranDepartment of Mathematics, Chaudhary Charan Singh University, Meerut, IndiaComputer Department, College of Science, University of Halabja, Halabja, IraqPattern Recognition and Machine Learning Lab, Gachon University, Sujeonggu, Seongnam, Republic of KoreaRoaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara <italic>et al.</italic> recently reported security vulnerabilities of Xu <italic>et al.</italic>&#x2019;s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG&#x2019;s security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols.https://ieeexplore.ieee.org/document/9454484/Global mobility networkroamingstolen smart card attacktraceability attackimpersonation attackScyther
collection DOAJ
language English
format Article
sources DOAJ
author Amir Masoud Rahmani
Mokhtar Mohammadi
Jan Lansky
Stanislava Mildeova
Masoumeh Safkhani
Saru Kumari
Sarkhel H. Taher Karim
Mehdi Hosseinzadeh
spellingShingle Amir Masoud Rahmani
Mokhtar Mohammadi
Jan Lansky
Stanislava Mildeova
Masoumeh Safkhani
Saru Kumari
Sarkhel H. Taher Karim
Mehdi Hosseinzadeh
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
IEEE Access
Global mobility network
roaming
stolen smart card attack
traceability attack
impersonation attack
Scyther
author_facet Amir Masoud Rahmani
Mokhtar Mohammadi
Jan Lansky
Stanislava Mildeova
Masoumeh Safkhani
Saru Kumari
Sarkhel H. Taher Karim
Mehdi Hosseinzadeh
author_sort Amir Masoud Rahmani
title AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
title_short AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
title_full AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
title_fullStr AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
title_full_unstemmed AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
title_sort amapg: advanced mobile authentication protocol for glomonet
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara <italic>et al.</italic> recently reported security vulnerabilities of Xu <italic>et al.</italic>&#x2019;s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG&#x2019;s security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols.
topic Global mobility network
roaming
stolen smart card attack
traceability attack
impersonation attack
Scyther
url https://ieeexplore.ieee.org/document/9454484/
work_keys_str_mv AT amirmasoudrahmani amapgadvancedmobileauthenticationprotocolforglomonet
AT mokhtarmohammadi amapgadvancedmobileauthenticationprotocolforglomonet
AT janlansky amapgadvancedmobileauthenticationprotocolforglomonet
AT stanislavamildeova amapgadvancedmobileauthenticationprotocolforglomonet
AT masoumehsafkhani amapgadvancedmobileauthenticationprotocolforglomonet
AT sarukumari amapgadvancedmobileauthenticationprotocolforglomonet
AT sarkhelhtaherkarim amapgadvancedmobileauthenticationprotocolforglomonet
AT mehdihosseinzadeh amapgadvancedmobileauthenticationprotocolforglomonet
_version_ 1721354194381701120