4.6 Article

A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography

Journal

IEEE ACCESS
Volume 4, Issue -, Pages 4394-4407

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2016.2596292

Keywords

Authentication; key-agreement; mobile services; security; AVISPA

Funding

  1. BK21 Plus Project entitled SW Human Resource Development Program for Supporting Smart Life within the Ministry of Education, School of Computer Science and Engineering, Kyungpook National University, South Korea [21A20131600005]
  2. Basic Science Research Program within the Ministry of Education through the National Research Foundation of Korea [NRF-2015R1D1A1A01060801]

Ask authors/readers for more resources

Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentication protocol for location-based services using asymmetric key cryptography. Unlike their claims, the vigilant analysis of this paper substantiates that Memon et al.'s protocol has quite a few limitations such as vulnerability to key compromised impersonation attack, insecure password changing phase, imperfect mutual authentication, and vulnerability to insider attack. Furthermore, this paper proposes an enhanced secure authentication protocol for roaming services on elliptic curve cryptography. The proposed protocol is also a two-factor authentication protocol and is suitable for practical applications due to the composition of light-weight operations. The proposed protocol's formal security is verified using Automated Validation of Internet Security Protocols and Applications tool to certify that the proposed protocol is free from security threats. The informal and formal security analyses along with the performance analysis sections determine that the proposed protocol performs better than Memon et al.'s protocol and other related protocols in terms of security and efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available