A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of print, online 19 May 2017 Author: Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Xiong Li, Adrijit Goswami Speaker: Nguyen Ngoc Tu Date: 2017/06/15 Green: environmentally friendly
Introduction Scenario Internet Services Intercept: Delete, modify, fabricate ; corrupt: clients Services
Motivations Zhao et al. (2014) Vulnerable to: Known session-specific temporary information attack; Privileged-insider attack; No provision for revocation and reregistration This proposed scheme Proposed a scheme to achieve: User anonymity Resist most known attacks Intercept: Delete, modify, fabricate ; corrupt: clients Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269
Outline Introduction Proposed scheme Conclusions Comments
Proposed scheme: Outline (1) Registration Registration (2) Authentication and key agreement at visited network Contribution
Proposed scheme (1/5) Elliptic curve: Base point: (1) Registration Secret key: Public key: Select Compute Compute Store into Store Compute AAKE: into its database Store into
Proposed scheme (2/5) AKA at visited network inputs Compute Verify AAKE:
Proposed scheme (3/5) AKA at visited network Select and compute Verify Compute AAKE: Check and retrieve Verify
Proposed scheme (4/5) AKA at visited network Compute Retrieve Verify AAKE: Verify Compute
Proposed scheme (5/5) AKA at visited network Compute Compute Verify AAKE: Verify Session key where
Computation cost comparison Performance comparison(1/3) Computation cost comparison AAKE: [42] Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269. [28] Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214–222. [26] Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications, 84(2), 1487–1508.
Communication cost comparison Performance comparison(2/3) Communication cost comparison AAKE: [42] Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269. [28] Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214–222. [26] Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications, 84(2), 1487–1508.
Security requirements comparison Performance comparison(3/3) Security requirements comparison AAKE:
Conclusions Secure against various known attacks But high computational cost Automated Validation of Internet Security Protocols and Applications.