ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
Cited 19 time in scopus Download 102 time Share share facebook twitter linkedin kakaostory
저자
유성진, 이준영, 박요한, 박영호, 이상우, 정보흥
발행일
202005
출처
Applied Sciences, v.10 no.10, pp.1-23
ISSN
2076-3417
출판사
MDPI
DOI
https://dx.doi.org/10.3390/app10103565
협약과제
20HR1100, 오토모티브 이더넷 기반 차량 보안위협 예측․탐지․대응 및 보안성 자동진단 기술개발, 정보흥
초록
With the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the information is transmitted over an open channel. Thus, secure and efficient authentication protocols are essential to provide secure roaming services for legitimate users. In 2018, Madhusudhan et al. presented a secure authentication protocol for global mobile networks. However, we demonstrated that their protocol could not prevent potential attacks, including masquerade, session key disclosure, and replay attacks. Thus, we proposed a secure and efficient three-factor authentication protocol to overcome the security weaknesses of Madhusudhan et al.'s scheme. The proposed scheme was demonstrated to prevent various attacks and provided a secure mutual authentication by utilizing biometrics and secret parameters. We evaluated the security of the proposed protocol using informal security analysis and formal security analysis, such as the real-or-random (ROR) model and Burrows-Abadi-Needham (BAN) logic. In addition, we showed that our scheme withstands man-in-the-middle (MITM) and replay attacks utilizing formal security validation automated validation of internet security protocols and applications (AVISPA) simulation. Finally, we compared the performance of our protocol with existing schemes. Consequently, our scheme ensured better security and efficiency features than existing schemes and can be suitable for resource-constrained mobile environments.
KSP 제안 키워드
Automated validation, Burrows-Abadi-Needham (BAN) logic, Existing schemes, Formal security analysis, Global mobility networks, Internet security, Man-in-the-middle, Mobile Technology, Mobile devices, Mobile networks, Resource-constrained
본 저작물은 크리에이티브 커먼즈 저작자 표시 (CC BY) 조건에 따라 이용할 수 있습니다.
저작자 표시 (CC BY)