Abstract
For secure communications in mobile communication networks, various authenticated key exchange schemes are proposed to provide the remote client authentication and the session key establishment. In these schemes, more considerations are to reduce the costs of remote mobile clients, but not those of the server. However, the server has become a bottleneck in large-scale mobile communication networks. In this paper, in order to relieve the server’s load, we presented an efficient authentication protocol with key exchange between the remote client and the server, and then generalized it to a three-party case, in which two remote clients can authenticate each other with the server’s help and share a secure session key. Compared with the relevant protocols, the proposed protocols require lower computation and communication costs, and above all, dramatically reduce those of the server. Therefore, the proposed protocols are more practical and suitable for large-scale mobile communication networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abi-Char, P.E., El-Hassan, B., Mhamed, A.: A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: Proceedings of the 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 235–240. IEEE, New York (2007)
Chen, Z.G., Song, X.X.: A distributed electronic authentication scheme based on elliptic curve. In: Proceedings of the Sixth International on Machine Learning and Cybernetics, pp. 2179–2182. IEEE, New York (2007)
Jiang, C., Li, B., Xu, H.: An efficient scheme for user authentication in wireless sensor networks. In: Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 438–442. IEEE, New York (2007)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31
Koblitz, N.: Elliptic curve cryptosystem. Math. Comput. 48, 203–209 (1987)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. IT 31, 469–472 (1985)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer Professional Computing. LNCS. Springer, New York (2004). https://doi.org/10.1007/b97644
Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3–4), 138–143 (2009)
Yoon, E.J., Yoo, K.Y.: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proceeding of 2009 International Conference on Computational Science and Engineering, vol. 02, pp. 633–640. IEEE Computer Society, Washington, DC, USA (2009)
He, D., Chen, J., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)
Yoon, E.J., Choi, S.B., Yoo, K.Y.: A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int. J. Innov. Comput. Inf. Control 8(4), 2637–2653 (2012)
He, D.: An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Netw. 10, 1009–1016 (2012)
Wang, D., Ma, C.G.: Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC. Inf. Fusion 14(4), 498–503 (2013)
Islam, S.K.H., Biswas, G.P.: A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11), 1892–1898 (2011)
Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19, 282–294 (2014)
Yang, J.H., Chang, C.C.: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Syst. Softw. 82(9), 1497–1502 (2009)
Chen, T.H., Lee, W.B., Chen, H.B.: A round-and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9), 1581–1590 (2008)
Tan, Z.: An enhanced three-party authentication key exchange protocol for mobile commerce environments. J. Commun. 5(5), 436–443 (2010)
Nose, P.: Security weaknesses of authenticated key agreement protocols. Inf. Process. Lett. 111(14), 687–696 (2011)
He, D., Chen, Y., Chen, J.: An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Comput. Eng. Comput. Sci. 38, 2055–2061 (2013)
Chou, C.H., Tsai, K.Y., Lu, C.F.: Two ID-based authenticated schemes with key agreement for mobile environments. J. Supercomput. 66(2), 973–988 (2013)
Farash, M.S., Attari, M.A.: A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J. Supercomput. 69(1), 395–411 (2014)
Shi, R.H., Zhong, H., Zhang, S.: Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks. J. Supercomput. 71(11), 4015–4018 (2015)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory IT 22(6), 644–654 (1976)
Yao, A.C.C., Zhao, Y.: Privacy-preserving authenticated key-exchange over internet. IEEE Trans. Inf. Forensics Security 9(1), 125–140 (2014)
Acknowledgement
This work was supported in part by the National Natural Science Foundation of China (61173187, 11301002), Natural Science Foundation of Anhui Province (1408085QF107), Talents Youth Fund of Anhui Province Universities (2013SQRL006ZD), 211 Project of Anhui University (17110099).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shi, Rh., Zhang, S. (2018). Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks. In: Wan, J., et al. Cloud Computing, Security, Privacy in New Computing Environments. CloudComp SPNCE 2016 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 197. Springer, Cham. https://doi.org/10.1007/978-3-319-69605-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-69605-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69604-1
Online ISBN: 978-3-319-69605-8
eBook Packages: Computer ScienceComputer Science (R0)