메뉴 건너뛰기




Volumn 9, Issue 16, 2016, Pages 3527-3542

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks

Author keywords

formal proof; formal verification; global mobility network; mutual authentication; smart card

Indexed keywords

AUTHENTICATION; COMPUTER CRIME; COPYRIGHTS; FORMAL VERIFICATION; MOBILE TELECOMMUNICATION SYSTEMS; PERSONAL COMMUNICATION SYSTEMS; SMART CARDS;

EID: 84978173214     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1558     Document Type: Article
Times cited : (86)

References (36)
  • 1
    • 84879448131 scopus 로고    scopus 로고
    • Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
    • Wu F, Xu L. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of Medical Systems 2013; 37(4). Article ID: 9958.
    • (2013) Journal of Medical Systems , vol.37 , Issue.4
    • Wu, F.1    Xu, L.2
  • 2
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
    • Li X, Ma J, Wang W, Xiong Y, Zhang J. A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 2013; 58(1): 85–95.
    • (2013) Mathematical and Computer Modelling , vol.58 , Issue.1 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 3
    • 84883653668 scopus 로고    scopus 로고
    • An enhanced smart card based remote user password authentication scheme
    • Li X, Niu J, Khan MK, Liao J. An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 2013; 36(5): 1365–1371.
    • (2013) Journal of Network and Computer Applications , vol.36 , Issue.5 , pp. 1365-1371
    • Li, X.1    Niu, J.2    Khan, M.K.3    Liao, J.4
  • 4
    • 84903610217 scopus 로고    scopus 로고
    • An efficient ticket based authentication protocol with unlinkability for wireless access networks
    • Jiang Q, Ma J, Li G, Yang L. An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wireless Personal Communications 2014; 77(2): 1489–1506.
    • (2014) Wireless Personal Communications , vol.77 , Issue.2 , pp. 1489-1506
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 5
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang Q, Ma J, Lu X, Tian Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 2015; 8(6): 1070–1081.
    • (2015) Peer-to-Peer Networking and Applications , vol.8 , Issue.6 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 6
    • 84919348312 scopus 로고    scopus 로고
    • An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
    • Xu L, Wu F. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Security and Communication Networks 2015; 8(2): 245–260.
    • (2015) Security and Communication Networks , vol.8 , Issue.2 , pp. 245-260
    • Xu, L.1    Wu, F.2
  • 7
    • 84942364844 scopus 로고    scopus 로고
    • A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client cserver networks
    • Wu F, Xu L, Kumari S, Li X. A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client cserver networks. Computers & Electrical Engineering 2015; 45: 274–285.
    • (2015) Computers & Electrical Engineering , vol.45 , pp. 274-285
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 8
    • 84963958402 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
    • Xu L, Wu F. Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. Journal of Medical Systems 2015; 39(2): 1–9.
    • (2015) Journal of Medical Systems , vol.39 , Issue.2 , pp. 1-9
    • Xu, L.1    Wu, F.2
  • 9
    • 84938819964 scopus 로고    scopus 로고
    • An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
    • Wu F, Xu L, Kumari S, Li X. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems 2015. DOI: 10.1007/s00530-015-0476-3.
    • (2015) Multimedia Systems
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 10
    • 84940853317 scopus 로고    scopus 로고
    • A new and secure authentication scheme for wireless sensor networks with formal proof
    • Wu F, Xu L, Kumari S, Li X. A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Networking and Applications 2015. DOI: 10.1007/s12083-015-0404-5.
    • (2015) Peer-to-Peer Networking and Applications
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 11
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Ren Y, Shen J, Wang J, Han J, Lee S. Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology 2015; 16(2): 317–323.
    • (2015) Journal of Internet Technology , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 12
    • 85010842165 scopus 로고    scopus 로고
    • A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
    • Wu F, Xu L, Kumari S, Li X. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. Journal of Ambient Intelligence and Humanized Computing 2016. DOI: 10.1007/s12652-016-0345-8.
    • (2016) Journal of Ambient Intelligence and Humanized Computing
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 13
    • 84954436216 scopus 로고    scopus 로고
    • A privacy preserving three-factor authentication protocol for e-health clouds
    • Jiang Q, Khan MK, Lu X, Ma J, He D. A privacy preserving three-factor authentication protocol for e-health clouds. The Journal of Supercomputing 2016. DOI: 10.1007/s11227-015-1610-x.
    • (2016) The Journal of Supercomputing
    • Jiang, Q.1    Khan, M.K.2    Lu, X.3    Ma, J.4    He, D.5
  • 14
    • 84958124876 scopus 로고    scopus 로고
    • Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    • Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics 2016; 83(4): 2085–2101.
    • (2016) Nonlinear Dynamics , vol.83 , Issue.4 , pp. 2085-2101
    • Jiang, Q.1    Wei, F.2    Fu, S.3    Ma, J.4    Li, G.5    Alelaiwi, A.6
  • 15
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • Guo P, Wang J, Geng XueHua, Kim ChangSeob, Kim Jeong-Uk. A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology 2014; 15(6): 929–935.
    • (2014) Journal of Internet Technology , vol.15 , Issue.6 , pp. 929-935
    • Guo, P.1    Wang, J.2    Geng, X.3    Kim, C.4    Kim, J.-U.5
  • 16
    • 84923216048 scopus 로고    scopus 로고
    • An improved and provable self-certified digital signature scheme with message recovery
    • Wu F, Xu L. An improved and provable self-certified digital signature scheme with message recovery. International Journal of Communication Systems 2015; 28(2): 344–357.
    • (2015) International Journal of Communication Systems , vol.28 , Issue.2 , pp. 344-357
    • Wu, F.1    Xu, L.2
  • 17
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50(1): 231–235.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2
  • 18
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee CC, Hwang MS, Liao IE. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53(5): 1683–1687.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 19
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu CC, Lee WB, Tsaur WJ. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2008; 12(10): 722–723.
    • (2008) IEEE Communications Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 20
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • Chang CC, Lee CY, Chiu YC. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009; 32(4): 611–618.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3
  • 21
    • 68349157387 scopus 로고    scopus 로고
    • Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
    • Youn TY, Park YH, Lim J. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 2009; 13(7): 471–473.
    • (2009) IEEE Communications Letters , vol.13 , Issue.7 , pp. 471-473
    • Youn, T.Y.1    Park, Y.H.2    Lim, J.3
  • 22
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • He D, Ma M, Zhang Y, Chen C, Bu J. A strong user authentication scheme with smart cards for wireless communications. Computer Communications 2011; 34(3): 367–374.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 23
    • 82755161699 scopus 로고    scopus 로고
    • Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
    • Mun H, Han K, Lee YS, Yeun CY, Choi HH. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling 2012; 55(1): 214–222.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1 , pp. 214-222
    • Mun, H.1    Han, K.2    Lee, Y.S.3    Yeun, C.Y.4    Choi, H.H.5
  • 24
    • 84893853289 scopus 로고    scopus 로고
    • Secure and efficient anonymous authentication scheme in global mobility networks
    • Kim JS, Kwak J. Secure and efficient anonymous authentication scheme in global mobility networks. Journal of Applied Mathematics 2013; 2013. Article ID: 302582.
    • (2013) Journal of Applied Mathematics , vol.2013
    • Kim, J.S.1    Kwak, J.2
  • 25
    • 84878975055 scopus 로고    scopus 로고
    • An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
    • Jiang Q, Ma J, Li G, Yang L. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications 2013; 68(4): 1477–1491.
    • (2013) Wireless Personal Communications , vol.68 , Issue.4 , pp. 1477-1491
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 26
    • 84931577706 scopus 로고    scopus 로고
    • An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    • Shin S, Yeh H, Kim K. An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-peer Networking and Applications 2015; 8(4): 674–683.
    • (2015) Peer-to-peer Networking and Applications , vol.8 , Issue.4 , pp. 674-683
    • Shin, S.1    Yeh, H.2    Kim, K.3
  • 27
    • 84890555385 scopus 로고    scopus 로고
    • A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
    • Wen F, Susilo W, Yang G. A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications 2013; 73(3): 993–1004.
    • (2013) Wireless Personal Communications , vol.73 , Issue.3 , pp. 993-1004
    • Wen, F.1    Susilo, W.2    Yang, G.3
  • 29
    • 84944168470 scopus 로고    scopus 로고
    • A privacy preserving authentication scheme for roaming services in global mobility networks
    • Zhang G, Fan D, Zhang Y, Li X, Liu X. A privacy preserving authentication scheme for roaming services in global mobility networks. Security and Communicaton Networks 2015; 8: 2850–2859.
    • (2015) Security and Communicaton Networks , vol.8 , pp. 2850-2859
    • Zhang, G.1    Fan, D.2    Zhang, Y.3    Li, X.4    Liu, X.5
  • 30
    • 85027455461 scopus 로고    scopus 로고
    • Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
    • Gope P, Hwang T. Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Systems Journal 2015. DOI: 10.1109/JSYST.2015.2416396.
    • (2015) IEEE Systems Journal
    • Gope, P.1    Hwang, T.2
  • 31
    • 84954088991 scopus 로고    scopus 로고
    • An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks
    • Gope P, Hwang T. An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network and Computer Applications 2016; 62: 1–8.
    • (2016) Journal of Network and Computer Applications , vol.62 , pp. 1-8
    • Gope, P.1    Hwang, T.2
  • 32
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
    • Wang D, He D, Wang P, Chu CH. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing 2015; 12(4): 428–442.
    • (2015) IEEE Transactions on Dependable and Secure Computing , vol.12 , Issue.4 , pp. 428-442
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.H.4
  • 33
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • In, Springer Berlin Heidelberg, Santa Barbara, California, USA
    • Kocher P, Jaffe J, Jun B. Differential power analysis. In Advances in Cryptology-CRYPTO'99. Springer Berlin Heidelberg: Santa Barbara, California, USA, 388–397; 1999.
    • (1999) Advances in Cryptology-CRYPTO'99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 34
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541–552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 35
    • 79959430513 scopus 로고    scopus 로고
    • One for all call for one: unifying standard differential power analysis attacks
    • Mangard S, Oswald E, Standaert FX. One for all call for one: unifying standard differential power analysis attacks. IET Information Security 2011; 5(2): 100–110.
    • (2011) IET Information Security , vol.5 , Issue.2 , pp. 100-110
    • Mangard, S.1    Oswald, E.2    Standaert, F.X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.