Cargando…

An improved anonymous authentication scheme for roaming in ubiquitous networks

With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks a...

Descripción completa

Detalles Bibliográficos
Autores principales: Lee, Hakjun, Lee, Donghoon, Moon, Jongho, Jung, Jaewook, Kang, Dongwoo, Kim, Hyoungshick, Won, Dongho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5837109/
https://www.ncbi.nlm.nih.gov/pubmed/29505575
http://dx.doi.org/10.1371/journal.pone.0193366
_version_ 1783304058291879936
author Lee, Hakjun
Lee, Donghoon
Moon, Jongho
Jung, Jaewook
Kang, Dongwoo
Kim, Hyoungshick
Won, Dongho
author_facet Lee, Hakjun
Lee, Donghoon
Moon, Jongho
Jung, Jaewook
Kang, Dongwoo
Kim, Hyoungshick
Won, Dongho
author_sort Lee, Hakjun
collection PubMed
description With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.
format Online
Article
Text
id pubmed-5837109
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-58371092018-03-19 An improved anonymous authentication scheme for roaming in ubiquitous networks Lee, Hakjun Lee, Donghoon Moon, Jongho Jung, Jaewook Kang, Dongwoo Kim, Hyoungshick Won, Dongho PLoS One Research Article With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. Public Library of Science 2018-03-05 /pmc/articles/PMC5837109/ /pubmed/29505575 http://dx.doi.org/10.1371/journal.pone.0193366 Text en © 2018 Lee et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Lee, Hakjun
Lee, Donghoon
Moon, Jongho
Jung, Jaewook
Kang, Dongwoo
Kim, Hyoungshick
Won, Dongho
An improved anonymous authentication scheme for roaming in ubiquitous networks
title An improved anonymous authentication scheme for roaming in ubiquitous networks
title_full An improved anonymous authentication scheme for roaming in ubiquitous networks
title_fullStr An improved anonymous authentication scheme for roaming in ubiquitous networks
title_full_unstemmed An improved anonymous authentication scheme for roaming in ubiquitous networks
title_short An improved anonymous authentication scheme for roaming in ubiquitous networks
title_sort improved anonymous authentication scheme for roaming in ubiquitous networks
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5837109/
https://www.ncbi.nlm.nih.gov/pubmed/29505575
http://dx.doi.org/10.1371/journal.pone.0193366
work_keys_str_mv AT leehakjun animprovedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT leedonghoon animprovedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT moonjongho animprovedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT jungjaewook animprovedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT kangdongwoo animprovedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT kimhyoungshick animprovedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT wondongho animprovedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT leehakjun improvedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT leedonghoon improvedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT moonjongho improvedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT jungjaewook improvedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT kangdongwoo improvedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT kimhyoungshick improvedanonymousauthenticationschemeforroaminginubiquitousnetworks
AT wondongho improvedanonymousauthenticationschemeforroaminginubiquitousnetworks