AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rahmani, Amir Masoud | - |
dc.contributor.author | Mohammadi, Mokhtar | - |
dc.contributor.author | Lansky, Jan | - |
dc.contributor.author | Mildeova, Stanislava | - |
dc.contributor.author | Safkhani, Masoumeh | - |
dc.contributor.author | Kumari, Saru | - |
dc.contributor.author | Karim, Sarkhel H. Taher | - |
dc.contributor.author | Hosseinzadeh, Mehdi | - |
dc.date.accessioned | 2021-07-28T00:41:30Z | - |
dc.date.available | 2021-07-28T00:41:30Z | - |
dc.date.created | 2021-07-28 | - |
dc.date.issued | 2021-06 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81766 | - |
dc.description.abstract | Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara et al. recently reported security vulnerabilities of Xu et al.'s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG's security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.title | AMAPG: Advanced Mobile Authentication Protocol for GLOMONET | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000673404000001 | - |
dc.identifier.doi | 10.1109/ACCESS.2021.3089102 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.9, pp.88256 - 88271 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85117619814 | - |
dc.citation.endPage | 88271 | - |
dc.citation.startPage | 88256 | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 9 | - |
dc.contributor.affiliatedAuthor | Hosseinzadeh, Mehdi | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Protocols | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Smart cards | - |
dc.subject.keywordAuthor | Roaming | - |
dc.subject.keywordAuthor | Password | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | Global mobility network | - |
dc.subject.keywordAuthor | roaming | - |
dc.subject.keywordAuthor | stolen smart card attack | - |
dc.subject.keywordAuthor | traceability attack | - |
dc.subject.keywordAuthor | impersonation attack | - |
dc.subject.keywordAuthor | Scyther | - |
dc.subject.keywordAuthor | BAN logic | - |
dc.subject.keywordPlus | KEY AGREEMENT SCHEME | - |
dc.subject.keywordPlus | ROAMING SERVICE | - |
dc.subject.keywordPlus | SECURE AUTHENTICATION | - |
dc.subject.keywordPlus | USER ANONYMITY | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.