Skip to main content
Log in

Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Two-factor authentication scheme for roaming service in global mobility network enables the mobile user in possession of a password and a smart card to achieve mutual authentication and session key establishment with the foreign agent. In this paper, we first identify six properties of this type of schemes: (1) Anonymity and untraceability; (2) Robustness; (3) Authentication; (4) Session key security and fairness; (5) User friendliness; and (6) Efficiency, then propose a new scheme which satisfies all these requirements. Our result is validated applying the formal verification tool ProVerif based on applied pi calculus.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230–234.

    MathSciNet  Google Scholar 

  2. Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.

    Article  Google Scholar 

  3. Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722–723.

    Article  Google Scholar 

  4. Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611–618.

    Article  Google Scholar 

  5. Youn, T. Y., Park, Y. H., & Li, M. J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communicaions Letters, 13(7), 1118–1123.

    Google Scholar 

  6. He, D., Chan, S., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.

    Google Scholar 

  7. Jiang, Q., Ma, J., Li, G., & Yang, L. (2012). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications. doi: 10.1007/s11277-012-0535-4.

  8. Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1–2), 214–222.

    Article  MATH  MathSciNet  Google Scholar 

  9. Xu, J., Zhou, W. T., & Feng, D. G. (2011). An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34, 319–325.

    Article  Google Scholar 

  10. He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34, 367–374.

    Article  Google Scholar 

  11. Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.

    Article  MATH  MathSciNet  Google Scholar 

  12. Chen, Y. C., Chuang, S. C., Yeh, L. Y., & Huang, J. L. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366–1375.

    Article  Google Scholar 

  13. Chen, C., He, D., Chan, S., Bu, J., Gao, Y., & Fan, R. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24, 347–362.

    Article  Google Scholar 

  14. Abadi, M., Blanchet, B., & Lundh, H. C. (2009). Models and proofs of protocol security: A progress report. In 21st International conference on computer aided verification (pp. 35–49), Grenoble, France.

  15. Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on principles of programming languages (pp. 104–115). New York: ACM.

  16. Dolev, D., & Yao, A. C. (1983). On the security of public-key protocols. IEEE Transaction on Information Theory, 2(29), 198–208.

    Article  MathSciNet  Google Scholar 

  17. Abadi, M., & Blanchet, B. (2003). Computer-assisted verification of a protocol for certified email. In Proceedings of the 10th international symposium on static analysis, LNCS (vol. 2694, pp. 316–335). Berlin: Springer.

  18. Abadi, M., Blanchet, B., & Fournet, C. (2004). Just fast keying in the Pi calculus. In Proceedings of the 13th European symposium on programming, LNCS (vol. 2986, pp. 340–354). Berlin: Springer.

  19. Bai, G., Meng, G., Lei, J., Venkatraman, S. S., Saxena, P., Sun, J., et al. (2013). AuthScan: Automatic extraction of Web authentication protocols from implementations. In Proceedings of the 20th annual network and distributed system security symposium. http://www.comp.nus.edu.sg/~prateeks/papers/AuthScan.pdf.

  20. http://proverif.rocq.inria.fr/index.php.

Download references

Acknowledgments

This research was supported by the National Natural Science Foundation of China (No. 61070153), the Major State Basic Research Development (973) Program of China (No. 2013CB834205), and Natural Science Foundation of Zhejiang Province (No. LZ12F02005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Xie.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xie, Q., Hu, B., Tan, X. et al. Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Wireless Pers Commun 74, 601–614 (2014). https://doi.org/10.1007/s11277-013-1309-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1309-3

Keywords

Navigation