A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks

Vanga Odelu, Sherali Zeadally, Ashok Kumar Das, Mohammad Wazid, Debiao He

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

The rapid proliferation of mobile networks has made security an important issue, particularly for transaction oriented applications. Recently, Jo et al. presented an efficient authentication protocol for wireless mobile networks and asserted that their proposed approach provides all known security functionalities including session key (SK) security under the assumption of the widely-accepted Canetti–Krawczyk (CK) model. We reviewed Jo et al.’s proposed roaming protocol and we demonstrate that it fails to provide the SK-security under the CK-adversary setting. We then propose an enhancement to Jo et al.’s roaming protocol to address the security drawback found in Jo et al.’s protocol. In the enhanced roaming protocol, we achieve the SK-security along with reduced computation, communication and storage costs. We also simulate the enhanced roaming protocol using NS2 for end-to-end delay and network throughput, and the simulation results obtained demonstrate the efficiency of our protocol.

Original languageEnglish
Pages (from-to)431-445
Number of pages15
JournalTelecommunication Systems
Volume69
Issue number4
DOIs
StatePublished - Dec 1 2018

Bibliographical note

Publisher Copyright:
© 2018, Springer Science+Business Media, LLC, part of Springer Nature.

Keywords

  • Authentication
  • Performance
  • Privacy
  • Secure roaming
  • Security

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks'. Together they form a unique fingerprint.

Cite this