메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 319-325

An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks

Author keywords

Anonymity; Authentication; Key agreement; Roaming service; Wireless security

Indexed keywords

ANONYMITY; COST-EFFICIENT; KEY AGREEMENT; MOBILE NETWORKS; MOBILE NODES; MUTUAL AUTHENTICATION; NEW PROTOCOL; ROAMING SERVICES; SECURITY ENHANCEMENTS; USER ANONYMITY; USER FRIENDLINESS; WIRELESS SECURITY;

EID: 78751650071     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.04.041     Document Type: Article
Times cited : (62)

References (17)
  • 1
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • M.-X. Zhang, and Y.-G. Fang Security analysis and enhancements of 3GPP authentication and key agreement protocol IEEE Trans. Wireless Commun. 4 2 2005 734 742
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.-X.1    Fang, Y.-G.2
  • 2
    • 33748196456 scopus 로고    scopus 로고
    • Man-in-the-middle attack on the authentication of the user from the remote autonomous object
    • C.-Y. Yang, C.-C. Lee, and S.-Y. Hsiao Man-in-the-middle attack on the authentication of the user from the remote autonomous object Int. J. Netw. Secur. 1 2 2005 81 83
    • (2005) Int. J. Netw. Secur. , vol.1 , Issue.2 , pp. 81-83
    • Yang, C.-Y.1    Lee, C.-C.2    Hsiao, S.-Y.3
  • 3
    • 0037942544 scopus 로고    scopus 로고
    • Cryptanalysis of mutual authentication and key exchange for low power wireless communications
    • K. Shim Cryptanalysis of mutual authentication and key exchange for low power wireless communications IEEE Commun. Lett. 7 5 2003 248 250
    • (2003) IEEE Commun. Lett. , vol.7 , Issue.5 , pp. 248-250
    • Shim, K.1
  • 4
    • 2442620328 scopus 로고    scopus 로고
    • Comments on mutual authentication and key exchange protocols for low power wireless communications
    • S.L. Ng, and C. Mitchell Comments on mutual authentication and key exchange protocols for low power wireless communications IEEE Commun. Lett. 8 4 2004 262 263
    • (2004) IEEE Commun. Lett. , vol.8 , Issue.4 , pp. 262-263
    • Ng, S.L.1    Mitchell, C.2
  • 5
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Y.-Y. Wang, J.-Y. Liu, F.-X. Xiao, and J. Dan A more efficient and secure dynamic ID-based remote user authentication scheme Computer Commun. 32 4 2009 583 585
    • (2009) Computer Commun. , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.-Y.1    Liu, J.-Y.2    Xiao, F.-X.3    Dan, J.4
  • 6
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • K.-F. Hwang, and C.-C. Chang A self-encryption mechanism for authentication of roaming and teleconference services IEEE Trans. Wireless Commun. 2 2 2003 400 407
    • (2003) IEEE Trans. Wireless Commun. , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.-F.1    Chang, C.-C.2
  • 7
    • 61849096169 scopus 로고    scopus 로고
    • More secure remote user authentication scheme
    • S.-K. Kima, and M.-G. Chung More secure remote user authentication scheme Computer Commun. 32 6 2009 1018 1021
    • (2009) Computer Commun. , vol.32 , Issue.6 , pp. 1018-1021
    • Kima, S.-K.1    Chung, M.-G.2
  • 8
    • 2142759434 scopus 로고    scopus 로고
    • End-to-end security protocol for mobile communications with end-user identification/authentication
    • C.-C. Chang, K.-L. Chen, and M.-S. Hwang End-to-end security protocol for mobile communications with end-user identification/authentication Wireless Pers. Commun. 28 2 2004 95 106
    • (2004) Wireless Pers. Commun. , vol.28 , Issue.2 , pp. 95-106
    • Chang, C.-C.1    Chen, K.-L.2    Hwang, M.-S.3
  • 9
    • 0036409380 scopus 로고    scopus 로고
    • An improvement of mobile users authentication in the integration environments
    • M.-S. Hwang, C.-C. Lee, and W.-P. Yang An improvement of mobile users authentication in the integration environments Int. J. Electron. Commun. 56 5 2002 293 297
    • (2002) Int. J. Electron. Commun. , vol.56 , Issue.5 , pp. 293-297
    • Hwang, M.-S.1    Lee, C.-C.2    Yang, W.-P.3
  • 10
    • 0345306310 scopus 로고    scopus 로고
    • A new privacy and authentication protocol for end-to-end mobile users
    • C.-C. Lee, C.-C. Yang, and M.-S. Hwang A new privacy and authentication protocol for end-to-end mobile users Int. J. Commun. Syst. 16 9 2003 799 808
    • (2003) Int. J. Commun. Syst. , vol.16 , Issue.9 , pp. 799-808
    • Lee, C.-C.1    Yang, C.-C.2    Hwang, M.-S.3
  • 11
    • 0035135698 scopus 로고    scopus 로고
    • Authentication of mobile users in third generation mobile system
    • Z.-J. Tzeng, and W.-G. Tzeng Authentication of mobile users in third generation mobile system Wireless Pers. Commun. 16 1 2001 35 50
    • (2001) Wireless Pers. Commun. , vol.16 , Issue.1 , pp. 35-50
    • Tzeng, Z.-J.1    Tzeng, W.-G.2
  • 12
    • 0033907037 scopus 로고    scopus 로고
    • Extensions to an authentication technique proposed for the global mobility network
    • L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm Extensions to an authentication technique proposed for the global mobility network IEEE Trans. Commun. 48 3 2000 373 376
    • (2000) IEEE Trans. Commun. , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Staamann, S.3    Wilhelm, U.4
  • 13
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • J. Zhu, and J. Ma A new authentication scheme with anonymity for wireless environments IEEE Trans. Consum. Electron. 50 1 2004 230 234
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 14
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • C.-C. Lee, and M.-S. Hwang Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Trans. Indus. Electron. 53 5 2006 1683 1686
    • (2006) IEEE Trans. Indus. Electron. , vol.53 , Issue.5 , pp. 1683-1686
    • Lee, C.-C.1    Hwang, M.-S.2
  • 17
    • 33947382591 scopus 로고    scopus 로고
    • Cryptography on a speck of dust
    • J.-P. Kaps, G. Gaubatz, and B. Sunar Cryptography on a speck of dust Computer 40 2007 38 44
    • (2007) Computer , vol.40 , pp. 38-44
    • Kaps, J.-P.1    Gaubatz, G.2    Sunar, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.