A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentication protocol for location-based services using a...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2016-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7526310/ |
id |
doaj-f1d2e0fe785642d89c31ebc40e12e708 |
---|---|
record_format |
Article |
spelling |
doaj-f1d2e0fe785642d89c31ebc40e12e7082021-03-29T19:46:50ZengIEEEIEEE Access2169-35362016-01-0144394440710.1109/ACCESS.2016.25962927526310A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve CryptographyAlavalapati Goutham Reddy0https://orcid.org/0000-0002-4335-8331Ashok Kumar Das1Eun-Jun Yoon2Kee-Young Yoo3School of Computer Science and Engineering, Kyungpook National University, Daegu, South KoreaCenter for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, IndiaDepartment of Cyber Security, Kyungil University, Gyeongsan, South KoreaSchool of Computer Science and Engineering, Kyungpook National University, Daegu, South KoreaMobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentication protocol for location-based services using asymmetric key cryptography. Unlike their claims, the vigilant analysis of this paper substantiates that Memon et al.'s protocol has quite a few limitations such as vulnerability to key compromised impersonation attack, insecure password changing phase, imperfect mutual authentication, and vulnerability to insider attack. Furthermore, this paper proposes an enhanced secure authentication protocol for roaming services on elliptic curve cryptography. The proposed protocol is also a two-factor authentication protocol and is suitable for practical applications due to the composition of light-weight operations. The proposed protocol's formal security is verified using Automated Validation of Internet Security Protocols and Applications tool to certify that the proposed protocol is free from security threats. The informal and formal security analyses along with the performance analysis sections determine that the proposed protocol performs better than Memon et al.'s protocol and other related protocols in terms of security and efficiency.https://ieeexplore.ieee.org/document/7526310/Authenticationkey-agreementmobile servicessecurityAVISPA |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Alavalapati Goutham Reddy Ashok Kumar Das Eun-Jun Yoon Kee-Young Yoo |
spellingShingle |
Alavalapati Goutham Reddy Ashok Kumar Das Eun-Jun Yoon Kee-Young Yoo A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography IEEE Access Authentication key-agreement mobile services security AVISPA |
author_facet |
Alavalapati Goutham Reddy Ashok Kumar Das Eun-Jun Yoon Kee-Young Yoo |
author_sort |
Alavalapati Goutham Reddy |
title |
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography |
title_short |
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography |
title_full |
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography |
title_fullStr |
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography |
title_full_unstemmed |
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography |
title_sort |
secure anonymous authentication protocol for mobile services on elliptic curve cryptography |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2016-01-01 |
description |
Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentication protocol for location-based services using asymmetric key cryptography. Unlike their claims, the vigilant analysis of this paper substantiates that Memon et al.'s protocol has quite a few limitations such as vulnerability to key compromised impersonation attack, insecure password changing phase, imperfect mutual authentication, and vulnerability to insider attack. Furthermore, this paper proposes an enhanced secure authentication protocol for roaming services on elliptic curve cryptography. The proposed protocol is also a two-factor authentication protocol and is suitable for practical applications due to the composition of light-weight operations. The proposed protocol's formal security is verified using Automated Validation of Internet Security Protocols and Applications tool to certify that the proposed protocol is free from security threats. The informal and formal security analyses along with the performance analysis sections determine that the proposed protocol performs better than Memon et al.'s protocol and other related protocols in terms of security and efficiency. |
topic |
Authentication key-agreement mobile services security AVISPA |
url |
https://ieeexplore.ieee.org/document/7526310/ |
work_keys_str_mv |
AT alavalapatigouthamreddy asecureanonymousauthenticationprotocolformobileservicesonellipticcurvecryptography AT ashokkumardas asecureanonymousauthenticationprotocolformobileservicesonellipticcurvecryptography AT eunjunyoon asecureanonymousauthenticationprotocolformobileservicesonellipticcurvecryptography AT keeyoungyoo asecureanonymousauthenticationprotocolformobileservicesonellipticcurvecryptography AT alavalapatigouthamreddy secureanonymousauthenticationprotocolformobileservicesonellipticcurvecryptography AT ashokkumardas secureanonymousauthenticationprotocolformobileservicesonellipticcurvecryptography AT eunjunyoon secureanonymousauthenticationprotocolformobileservicesonellipticcurvecryptography AT keeyoungyoo secureanonymousauthenticationprotocolformobileservicesonellipticcurvecryptography |
_version_ |
1724195783673118720 |