Provably secure mutual authentication and key agreement scheme with user anonymity

Tzone-Lih Hwang, Prosanta Gope

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

With the widespread use of several mobile gadgets, privacy and anonymity of the mobile subscriber becomes a major issue in mobile communication. Through the roaming technology of the global mobility networks, a legitimate subscriber can enjoy the ubiquitous services. Where, the mutual authentication and key agreement between the mobile subscriber and roaming network (VLR/SGSN) is the primary security aspect of many commercial mobile networks. For personal privacy perspective, it is important to develop a mutual authentication and key agreement scheme with several security features including the user anonymity. In this article, we come up with a novel authentication and key agreement scheme, which can assure privacy against eavesdroppers (PAE) with the subscriber anonymity. Simultaneously, here we argue that the proposed scheme can also withstand several other security vulnerabilities like redirection attack, forging-mobile-user attack and location privacy etc. with the less communication cost.

Original languageEnglish
Title of host publicationICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing
PublisherIEEE Computer Society
DOIs
Publication statusPublished - 2013
Event9th International Conference on Information, Communications and Signal Processing, ICICS 2013 - Tainan, Taiwan
Duration: 2013 Dec 102013 Dec 13

Other

Other9th International Conference on Information, Communications and Signal Processing, ICICS 2013
CountryTaiwan
CityTainan
Period13-12-1013-12-13

Fingerprint

Authentication
Communication
Forging
Wireless networks
Costs

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Signal Processing

Cite this

Hwang, T-L., & Gope, P. (2013). Provably secure mutual authentication and key agreement scheme with user anonymity. In ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing [6782847] IEEE Computer Society. https://doi.org/10.1109/ICICS.2013.6782847
Hwang, Tzone-Lih ; Gope, Prosanta. / Provably secure mutual authentication and key agreement scheme with user anonymity. ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing. IEEE Computer Society, 2013.
@inproceedings{df887aefdbc64b2da1466474cd08728d,
title = "Provably secure mutual authentication and key agreement scheme with user anonymity",
abstract = "With the widespread use of several mobile gadgets, privacy and anonymity of the mobile subscriber becomes a major issue in mobile communication. Through the roaming technology of the global mobility networks, a legitimate subscriber can enjoy the ubiquitous services. Where, the mutual authentication and key agreement between the mobile subscriber and roaming network (VLR/SGSN) is the primary security aspect of many commercial mobile networks. For personal privacy perspective, it is important to develop a mutual authentication and key agreement scheme with several security features including the user anonymity. In this article, we come up with a novel authentication and key agreement scheme, which can assure privacy against eavesdroppers (PAE) with the subscriber anonymity. Simultaneously, here we argue that the proposed scheme can also withstand several other security vulnerabilities like redirection attack, forging-mobile-user attack and location privacy etc. with the less communication cost.",
author = "Tzone-Lih Hwang and Prosanta Gope",
year = "2013",
doi = "10.1109/ICICS.2013.6782847",
language = "English",
booktitle = "ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing",
publisher = "IEEE Computer Society",
address = "United States",

}

Hwang, T-L & Gope, P 2013, Provably secure mutual authentication and key agreement scheme with user anonymity. in ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing., 6782847, IEEE Computer Society, 9th International Conference on Information, Communications and Signal Processing, ICICS 2013, Tainan, Taiwan, 13-12-10. https://doi.org/10.1109/ICICS.2013.6782847

Provably secure mutual authentication and key agreement scheme with user anonymity. / Hwang, Tzone-Lih; Gope, Prosanta.

ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing. IEEE Computer Society, 2013. 6782847.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Provably secure mutual authentication and key agreement scheme with user anonymity

AU - Hwang, Tzone-Lih

AU - Gope, Prosanta

PY - 2013

Y1 - 2013

N2 - With the widespread use of several mobile gadgets, privacy and anonymity of the mobile subscriber becomes a major issue in mobile communication. Through the roaming technology of the global mobility networks, a legitimate subscriber can enjoy the ubiquitous services. Where, the mutual authentication and key agreement between the mobile subscriber and roaming network (VLR/SGSN) is the primary security aspect of many commercial mobile networks. For personal privacy perspective, it is important to develop a mutual authentication and key agreement scheme with several security features including the user anonymity. In this article, we come up with a novel authentication and key agreement scheme, which can assure privacy against eavesdroppers (PAE) with the subscriber anonymity. Simultaneously, here we argue that the proposed scheme can also withstand several other security vulnerabilities like redirection attack, forging-mobile-user attack and location privacy etc. with the less communication cost.

AB - With the widespread use of several mobile gadgets, privacy and anonymity of the mobile subscriber becomes a major issue in mobile communication. Through the roaming technology of the global mobility networks, a legitimate subscriber can enjoy the ubiquitous services. Where, the mutual authentication and key agreement between the mobile subscriber and roaming network (VLR/SGSN) is the primary security aspect of many commercial mobile networks. For personal privacy perspective, it is important to develop a mutual authentication and key agreement scheme with several security features including the user anonymity. In this article, we come up with a novel authentication and key agreement scheme, which can assure privacy against eavesdroppers (PAE) with the subscriber anonymity. Simultaneously, here we argue that the proposed scheme can also withstand several other security vulnerabilities like redirection attack, forging-mobile-user attack and location privacy etc. with the less communication cost.

UR - http://www.scopus.com/inward/record.url?scp=84899094950&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84899094950&partnerID=8YFLogxK

U2 - 10.1109/ICICS.2013.6782847

DO - 10.1109/ICICS.2013.6782847

M3 - Conference contribution

AN - SCOPUS:84899094950

BT - ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing

PB - IEEE Computer Society

ER -

Hwang T-L, Gope P. Provably secure mutual authentication and key agreement scheme with user anonymity. In ICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing. IEEE Computer Society. 2013. 6782847 https://doi.org/10.1109/ICICS.2013.6782847