Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    A Secure and Lightweight Authentication Protocol for Mobile User Preserving Privacy in Global Mobility Networks
    (Elsevier B.V., 2020) Madhusudhan, R.; Suvidha, K.S.
    In two factor authentication schemes the key factor that has to be addressed is user anonymity and privacy preservation during roaming scenario in GLObal MObility NETwork. While roaming MU needs to access the services of the FA, FA grants the service request only to the authenticated MU. To verify the authenticity of the MU, FA sends the service request of MU to HA. HA verifies the authenticity of the MU after which FA allows the MU to access the services. The entire communication during roaming is carried over insecure channel. Due to this, several security concerns are raised. The main objective in GLOMONET is to secure the channel and the designed scheme should over come all active and passive security attacks. Since, the scheme is designed for mobile networks, it should be light weight with less communication cost, one such scheme has been proposed in this article. The proposed scheme is light weight with less communication cost. Additionally the proposed scheme addresses the active and passive security attacks. The scheme is efficient in terms of computational and communication cost. The proposed scheme is robust and practically implementable. © 2020 The Authors. Published by Elsevier B.V.
  • Item
    Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    (Springer, 2020) Madhusudhan, R.; Shashidhara, R.
    In GLObal MObile NETwork (GLOMONET), it is essential to authenticate and provide secure communication between a user, foreign agent, and the home agent using session key. Designing a secure and efficient authentication protocol for roaming users in the mobile network is a challenging. In order to secure communication over an insecure channel, a number of authentication schemes have been proposed. The main weakness of the existing authentication protocols is that attackers have the ability to impersonate a legal user at any time. In addition, the existing protocols are vulnerable to various kind of cryptographic attacks such as insider attack, bit flipping attack, forgery attacks, denial-of-service attack, unfair key agreement and cannot provide user’s anonymity. To remedy these weaknesses and to achieve low communication and computation costs, we proposed a secure authentication scheme for roaming users. In addition, the formal verification tools ProVerif and AVISPA is used to check the correctness of the proposed protocol. Finally, the performance evaluation and simulation results shows that the proposed scheme is efficient in terms of communication and computational cost. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.