scholarly journals ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks

Cryptography ◽  
2021 ◽  
Vol 5 (4) ◽  
pp. 35
Author(s):  
Suvidha K. S. ◽  
Jothi Rangasamy ◽  
Shyam S. Kamath ◽  
Cheng-Chi Lee

The design and implementation of two-factor schemes designed for roaming mobile users for global mobility networks in smart cities requires attention to protect the scheme from various security attacks, such as the replay attack, impersonation attack, man-in-the-middle attack, password-guessing attack and stolen-smart-card attack. In addition to these attacks, the scheme should achieve user anonymity, unlinkability and perfect forward secrecy. In the roaming scenario, as mobile users are connected to the foreign network, mobile users must provide authentication details to the foreign network to which they are connected. The foreign network forwards the authentication messages received from the mobile users to their home network. The home network validates the authenticity of the mobile user. In the roaming scenario, all communication between the three entities is carried over an insecure channel. It is assumed that the adversary has the capabilities to intercept the messages transmitted over an insecure channel. Hence, the authentication scheme designed must be able to resist the above-mentioned security attacks and achieve the security goals. Our proposed scheme ES-HAS (elliptic curve-based secure handover authentication scheme) is a two-factor authentication scheme in which the mobile user possesses the password, and the smart card resists the above-mentioned security attacks. It also achieves the above-mentioned security goals. We also extended our two-factor authentication to a multi-factor authentication scheme using the fingerprint biometric technique. The formal security analysis using BAN logic and the formal security verification of the proposed scheme using the widely accepted AVISPA (automated validation of internet security protocols and applications) tool is presented in this article. In comparison with the related schemes, the proposed scheme is more efficient and robust. This makes the proposed scheme suitable for practical implementation.

2021 ◽  
Vol 13 (5) ◽  
pp. 111-128
Author(s):  
Sung Woon Lee ◽  
Hyunsung Kim

With the rapid development of mobile intelligent technologies and services, users can freely experience ubiquitous services in global mobility networks. It is necessary to provide authentications and protection to the privacy of mobile users. Until now, many authentication and privacy schemes were proposed. However, most of the schemes have been exposed to some security problems. Recently, Madhusudhan and Shashidhara (M&S) proposed a lightweight authentication scheme, denoted as the M&S scheme, for roaming services in global mobility networks. This paper shows that the M&S scheme has security flaws including two masquerading attacks and a mobile user trace attack. After that, we propose a privacypreserving authentication scheme for global mobility networks. The proposed scheme not only focused on the required security but also added privacy concerns focused on anonymity based on a dynamic pseudonym, which is based on exclusive-or operation, hash operation and symmetric key cryptography. Formal security analysis is performed based on Burrow-Abadi-Needdham (BAN) logic and the ProVerif tool, which concludes that the proposed scheme is secure. The analysis shows that the proposed authentication scheme is secure and provides privacy with a reasonable performance.


Author(s):  
A. Ameur ◽  
S. Ichou ◽  
S. Hammoudi ◽  
A. Benna ◽  
A. Meziane

Abstract. The industrial and academic interest of the research on mobile service recommendation systems based on a wide range of potential applications has significantly increased, owing to the rapid progress of mobile technologies. These systems aim to recommend the right product, service or information to the right mobile users at anytime and anywhere. In smart cities, recommending such services becomes more interesting but also more challenging due to the wide range of information that can be obtained on the user and his surrounding. This quantity and variety of information create problems in terms of processing as well as the problem of choosing the right information to use to offer services. We consider that to provide personalized mobile services in a smart city and know which information is relevant for the recommendation process, identifying and understanding the context of the mobile user is the key.This paper aims to address the issue of recommending personalized mobile services in smart cities by considering two steps: defining the context of the mobile user and designing an architecture of a system that can collect and process context data. Firstly, we propose an UML-based context model to show the contextual parameters to consider in recommending mobile services in a smart city. The model is based on three main classes from which others are divided: the user, his device and the environment. Secondly, we describe a general architecture based on the proposed context model for the collection and processing of context data.


2019 ◽  
Vol 32 (5) ◽  
pp. e3904 ◽  
Author(s):  
Arezou Ostad-Sharif ◽  
Abolfazl Babamohammadi ◽  
Dariush Abbasinezhad-Mood ◽  
Morteza Nikooghadam

Sign in / Sign up

Export Citation Format

Share Document