Skip to main content

Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks

  • Conference paper
  • First Online:
  • 854 Accesses

Abstract

For secure communications in mobile communication networks, various authenticated key exchange schemes are proposed to provide the remote client authentication and the session key establishment. In these schemes, more considerations are to reduce the costs of remote mobile clients, but not those of the server. However, the server has become a bottleneck in large-scale mobile communication networks. In this paper, in order to relieve the server’s load, we presented an efficient authentication protocol with key exchange between the remote client and the server, and then generalized it to a three-party case, in which two remote clients can authenticate each other with the server’s help and share a secure session key. Compared with the relevant protocols, the proposed protocols require lower computation and communication costs, and above all, dramatically reduce those of the server. Therefore, the proposed protocols are more practical and suitable for large-scale mobile communication networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Abi-Char, P.E., El-Hassan, B., Mhamed, A.: A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: Proceedings of the 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 235–240. IEEE, New York (2007)

    Google Scholar 

  2. Chen, Z.G., Song, X.X.: A distributed electronic authentication scheme based on elliptic curve. In: Proceedings of the Sixth International on Machine Learning and Cybernetics, pp. 2179–2182. IEEE, New York (2007)

    Google Scholar 

  3. Jiang, C., Li, B., Xu, H.: An efficient scheme for user authentication in wireless sensor networks. In: Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 438–442. IEEE, New York (2007)

    Google Scholar 

  4. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31

    Google Scholar 

  5. Koblitz, N.: Elliptic curve cryptosystem. Math. Comput. 48, 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  6. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  7. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. IT 31, 469–472 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  8. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer Professional Computing. LNCS. Springer, New York (2004). https://doi.org/10.1007/b97644

    MATH  Google Scholar 

  9. Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3–4), 138–143 (2009)

    Article  Google Scholar 

  10. Yoon, E.J., Yoo, K.Y.: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proceeding of 2009 International Conference on Computational Science and Engineering, vol. 02, pp. 633–640. IEEE Computer Society, Washington, DC, USA (2009)

    Google Scholar 

  11. He, D., Chen, J., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3), 223–230 (2012)

    Article  Google Scholar 

  12. Yoon, E.J., Choi, S.B., Yoo, K.Y.: A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int. J. Innov. Comput. Inf. Control 8(4), 2637–2653 (2012)

    Google Scholar 

  13. He, D.: An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Netw. 10, 1009–1016 (2012)

    Article  Google Scholar 

  14. Wang, D., Ma, C.G.: Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC. Inf. Fusion 14(4), 498–503 (2013)

    Article  Google Scholar 

  15. Islam, S.K.H., Biswas, G.P.: A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11), 1892–1898 (2011)

    Article  Google Scholar 

  16. Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19, 282–294 (2014)

    Google Scholar 

  17. Yang, J.H., Chang, C.C.: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Syst. Softw. 82(9), 1497–1502 (2009)

    Article  Google Scholar 

  18. Chen, T.H., Lee, W.B., Chen, H.B.: A round-and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9), 1581–1590 (2008)

    Article  Google Scholar 

  19. Tan, Z.: An enhanced three-party authentication key exchange protocol for mobile commerce environments. J. Commun. 5(5), 436–443 (2010)

    Article  Google Scholar 

  20. Nose, P.: Security weaknesses of authenticated key agreement protocols. Inf. Process. Lett. 111(14), 687–696 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  21. He, D., Chen, Y., Chen, J.: An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Comput. Eng. Comput. Sci. 38, 2055–2061 (2013)

    MATH  MathSciNet  Google Scholar 

  22. Chou, C.H., Tsai, K.Y., Lu, C.F.: Two ID-based authenticated schemes with key agreement for mobile environments. J. Supercomput. 66(2), 973–988 (2013)

    Article  Google Scholar 

  23. Farash, M.S., Attari, M.A.: A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J. Supercomput. 69(1), 395–411 (2014)

    Article  Google Scholar 

  24. Shi, R.H., Zhong, H., Zhang, S.: Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks. J. Supercomput. 71(11), 4015–4018 (2015)

    Article  Google Scholar 

  25. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory IT 22(6), 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  26. Yao, A.C.C., Zhao, Y.: Privacy-preserving authenticated key-exchange over internet. IEEE Trans. Inf. Forensics Security 9(1), 125–140 (2014)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported in part by the National Natural Science Foundation of China (61173187, 11301002), Natural Science Foundation of Anhui Province (1408085QF107), Talents Youth Fund of Anhui Province Universities (2013SQRL006ZD), 211 Project of Anhui University (17110099).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Run-hua Shi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shi, Rh., Zhang, S. (2018). Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks. In: Wan, J., et al. Cloud Computing, Security, Privacy in New Computing Environments. CloudComp SPNCE 2016 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 197. Springer, Cham. https://doi.org/10.1007/978-3-319-69605-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69605-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69604-1

  • Online ISBN: 978-3-319-69605-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics