{"title":"A secure lightweight two-factor authentication scheme in global mobility networks","authors":"R. Madhusudhan, K. Suvidha","doi":"10.1504/ijssc.2019.104221","DOIUrl":null,"url":null,"abstract":"In 2016, Gope and Hwang have proposed a scheme, in which they stated that their scheme preserves user anonymity. However with the thorough cryptanalysis of their scheme, we have proved that their scheme is vulnerable to various security attacks. To overcome the security attacks and to achieve the security goals, a new scheme has been proposed. Through the rigorous informal and formal security analysis, we have demonstrated that the proposed scheme is secure against the security attacks. Further, the proposed scheme is simulated using widely accepted automated validation of internet security protocols and applications (AVISPA) tool. With the simulated results of the proposed scheme, we proved that the proposed scheme is secure against active and passive security attacks. Additionally, the proposed scheme is compared with Gope and Hwang and other schemes in terms of performance, computational cost and communication overhead. The proposed scheme is efficient and robust.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"1 1","pages":"109-123"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Space-Based and Situated Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijssc.2019.104221","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In 2016, Gope and Hwang have proposed a scheme, in which they stated that their scheme preserves user anonymity. However with the thorough cryptanalysis of their scheme, we have proved that their scheme is vulnerable to various security attacks. To overcome the security attacks and to achieve the security goals, a new scheme has been proposed. Through the rigorous informal and formal security analysis, we have demonstrated that the proposed scheme is secure against the security attacks. Further, the proposed scheme is simulated using widely accepted automated validation of internet security protocols and applications (AVISPA) tool. With the simulated results of the proposed scheme, we proved that the proposed scheme is secure against active and passive security attacks. Additionally, the proposed scheme is compared with Gope and Hwang and other schemes in terms of performance, computational cost and communication overhead. The proposed scheme is efficient and robust.