메뉴 건너뛰기




Volumn 30, Issue 4, 2017, Pages

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security

Author keywords

anonymity; password based authentication; provable security; roaming service; ubiquitous networks

Indexed keywords

ALUMINUM; AUTHENTICATION; CARRIER COMMUNICATION; COMPUTATIONAL EFFICIENCY; COPYRIGHTS; HOME NETWORKS; PERSONAL COMMUNICATION SYSTEMS; UBIQUITOUS COMPUTING;

EID: 85010422698     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.3019     Document Type: Article
Times cited : (76)

References (39)
  • 1
    • 84902266968 scopus 로고    scopus 로고
    • An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    • Farash MS, Attari MA. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dynamics 2014; 77(1-2): 399–411.
    • (2014) Nonlinear Dynamics , vol.77 , Issue.1-2 , pp. 399-411
    • Farash, M.S.1    Attari, M.A.2
  • 2
    • 84902778355 scopus 로고    scopus 로고
    • An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems
    • Farash MS, Attari MA. An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems. Information Technology and Control 2014; 43(2): 143–150.
    • (2014) Information Technology and Control , vol.43 , Issue.2 , pp. 143-150
    • Farash, M.S.1    Attari, M.A.2
  • 3
    • 84928669844 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems
    • 10.1007/s10916-015-0244-0.
    • Chaudhry SA, Naqvi H, Shon T, Sher M, Farash MS. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems 2015; 39(6): 1–11. 10.1007/s10916-015-0244-0.
    • (2015) Journal of Medical Systems , vol.39 , Issue.6 , pp. 1-11
    • Chaudhry, S.A.1    Naqvi, H.2    Shon, T.3    Sher, M.4    Farash, M.S.5
  • 4
    • 84910619202 scopus 로고    scopus 로고
    • More secure smart card based remote user password authentication scheme with user anonymity
    • Kumari S, Khan MK. More secure smart card based remote user password authentication scheme with user anonymity. Security and Communication Networks 2013; 7(11): 2039–2053.
    • (2013) Security and Communication Networks , vol.7 , Issue.11 , pp. 2039-2053
    • Kumari, S.1    Khan, M.K.2
  • 5
    • 84958043300 scopus 로고    scopus 로고
    • A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    • 10.1007/s10660-015-9192-5.
    • Chaudhry SA, Farash M, Naqvi H, Sher M. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research 2015: 1–27. 10.1007/s10660-015-9192-5.
    • (2015) Electronic Commerce Research , pp. 1-27
    • Chaudhry, S.A.1    Farash, M.2    Naqvi, H.3    Sher, M.4
  • 7
    • 84978805810 scopus 로고    scopus 로고
    • An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards
    • 10.1002/dac.2848.
    • Farash MS, Attari MA. An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. International Journal of Communication Systems 2014. 10.1002/dac.2848.
    • (2014) International Journal of Communication Systems
    • Farash, M.S.1    Attari, M.A.2
  • 8
    • 84953364637 scopus 로고    scopus 로고
    • Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
    • 10.1007/s12083-014-0315-x.
    • Farash MS. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-peer Networking and Applications 2014. 10.1007/s12083-014-0315-x.
    • (2014) Peer-to-peer Networking and Applications
    • Farash, M.S.1
  • 9
    • 85006172493 scopus 로고    scopus 로고
    • An improved password-based authentication scheme for session initiation protocol using smart cards without verification table
    • 10.1002/dac.2879.
    • Farash MS, Attari MA. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. International Journal of Communication Systems 2014. 10.1002/dac.2879.
    • (2014) International Journal of Communication Systems
    • Farash, M.S.1    Attari, M.A.2
  • 10
    • 84953639516 scopus 로고    scopus 로고
    • A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
    • 10.1007/s11042-014-2296-4.
    • Farash MS, Attari MA. A provably secure and efficient authentication scheme for access control in mobile pay-TV systems. Multimedia Tools and Applications 2014. 10.1007/s11042-014-2296-4.
    • (2014) Multimedia Tools and Applications
    • Farash, M.S.1    Attari, M.A.2
  • 11
    • 84920868300 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
    • Farash MS. Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’. International Journal of Network Management 2014; 25(1): 31–51.
    • (2014) International Journal of Network Management , vol.25 , Issue.1 , pp. 31-51
    • Farash, M.S.1
  • 12
    • 84963686328 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
    • 10.1007/s11042-015-2487-8.
    • Farash MS, Kumari S, Bakhtiari M. Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimedia Tools and Applications 2015. 10.1007/s11042-015-2487-8.
    • (2015) Multimedia Tools and Applications
    • Farash, M.S.1    Kumari, S.2    Bakhtiari, M.3
  • 14
    • 84953636249 scopus 로고    scopus 로고
    • An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    • 10.1007/s11042-014-2282-x.
    • Arshad H, Nikooghadam M. An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools and Applications 2014. 10.1007/s11042-014-2282-x.
    • (2014) Multimedia Tools and Applications
    • Arshad, H.1    Nikooghadam, M.2
  • 15
    • 84904860928 scopus 로고    scopus 로고
    • A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
    • Irshad A, Sher M, Faisal MS, Ghani A, Hassan MU, Shehzad Ashraf Ch. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Security and Communication Networks 2013; 7(8): 1210–1218.
    • (2013) Security and Communication Networks , vol.7 , Issue.8 , pp. 1210-1218
    • Irshad, A.1    Sher, M.2    Faisal, M.S.3    Ghani, A.4    Hassan, M.U.5    Shehzad Ashraf, C.6
  • 18
    • 84902266968 scopus 로고    scopus 로고
    • An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    • Farash MS, Attari MA. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dynamics 2014; 77(1–2): 399–411.
    • (2014) Nonlinear Dynamics , vol.77 , Issue.1-2 , pp. 399-411
    • Farash, M.S.1    Attari, M.A.2
  • 19
    • 84902778355 scopus 로고    scopus 로고
    • An enhanced and secure three-party password-based authenticated key exchange protocol without using server?s public-keys and symmetric cryptosystems
    • Farash MS, Attari MA. An enhanced and secure three-party password-based authenticated key exchange protocol without using server?s public-keys and symmetric cryptosystems. Information Technology and Control 2014; 43(2): 143–150.
    • (2014) Information Technology and Control , vol.43 , Issue.2 , pp. 143-150
    • Farash, M.S.1    Attari, M.A.2
  • 20
    • 84899645425 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing
    • Farash MS, Attari MA. Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dynamics 2014; 76(2): 1203–1213.
    • (2014) Nonlinear Dynamics , vol.76 , Issue.2 , pp. 1203-1213
    • Farash, M.S.1    Attari, M.A.2
  • 21
    • 84919877261 scopus 로고    scopus 로고
    • An efficient client-client password-based authentication scheme with provable security
    • Farash MS, Attari MA. An efficient client-client password-based authentication scheme with provable security. The Journal of Supercomputing 2014; 70(2): 1002–1022.
    • (2014) The Journal of Supercomputing , vol.70 , Issue.2 , pp. 1002-1022
    • Farash, M.S.1    Attari, M.A.2
  • 22
    • 85028212628 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a three-party password based authenticated key exchange protocol with user anonymity using extended chaotic maps
    • 10.1002/dac.2912.
    • Farash MS, Attari MA, Kumari S. Cryptanalysis and improvement of a three-party password based authenticated key exchange protocol with user anonymity using extended chaotic maps. International Journal of Communication Systems 2014. 10.1002/dac.2912.
    • (2014) International Journal of Communication Systems
    • Farash, M.S.1    Attari, M.A.2    Kumari, S.3
  • 23
    • 84920868300 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
    • 10.1002/nem.1883.
    • Farash MS. Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’. International Journal of Network Management 2014; 25(1): 31–51. 10.1002/nem.1883.
    • (2014) International Journal of Network Management , vol.25 , Issue.1 , pp. 31-51
    • Farash, M.S.1
  • 24
    • 85010364277 scopus 로고    scopus 로고
    • A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
    • 10.1002/cpe.3477.
    • Farash MS, Islam SH, Obaidat MS. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks. Concurrency and Computation Practice & Experience 2015. 10.1002/cpe.3477.
    • (2015) Concurrency and Computation Practice & Experience
    • Farash, M.S.1    Islam, S.H.2    Obaidat, M.S.3
  • 25
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 2004; 50(1): 230–234.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 230-234
    • Zhu, J.1    Ma, J.2
  • 26
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee CC, Hwang MS, Liao IE. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 2006; 53(5): 1683–1687.
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 27
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu CC, Lee WB, Tsaur WJ. A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 2008; 12(10): 722–723.
    • (2008) IEEE Communications Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 28
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • Chang CC, Lee CY, Chiu YC. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 2009; 32(4): 611–618.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3
  • 29
    • 68349157387 scopus 로고    scopus 로고
    • Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
    • Youn TY, Park YH, Li MJ. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 2009; 13(7): 1118–1123.
    • (2009) IEEE Communications Letters , vol.13 , Issue.7 , pp. 1118-1123
    • Youn, T.Y.1    Park, Y.H.2    Li, M.J.3
  • 30
    • 82755161699 scopus 로고    scopus 로고
    • Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
    • Mun H, Han K, Lee YS, Yeun CY, Choi HH. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modeling 2012; 55(1–2): 214–222.
    • (2012) Mathematical and Computer Modeling , vol.55 , Issue.1-2 , pp. 214-222
    • Mun, H.1    Han, K.2    Lee, Y.S.3    Yeun, C.Y.4    Choi, H.H.5
  • 31
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • Li C, Hwang M, Chung Y. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communication 2008; 31: 2803–2814.
    • (2008) Computer Communication , vol.31 , pp. 2803-2814
    • Li, C.1    Hwang, M.2    Chung, Y.3
  • 32
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • Li CT, Lee CC. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modeling 2012; 55(1-2): 35–44.
    • (2012) Mathematical and Computer Modeling , vol.55 , Issue.1-2 , pp. 35-44
    • Li, C.T.1    Lee, C.C.2
  • 34
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • Chen C, He D, Chan S, Bu J, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24: 347–362.
    • (2011) International Journal of Communication Systems , vol.24 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Gao, Y.5    Fan, R.6
  • 35
    • 84895058980 scopus 로고    scopus 로고
    • Robust anonymous two-factor authentication scheme for roaming service in global mobility network
    • Xie Q, Hu B, Tan X, Bao M, Yu X. Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications 2013; 74(2): 601–614.
    • (2013) Wireless Personal Communications , vol.74 , Issue.2 , pp. 601-614
    • Xie, Q.1    Hu, B.2    Tan, X.3    Bao, M.4    Yu, X.5
  • 36
    • 84855586177 scopus 로고    scopus 로고
    • Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
    • He D, Chan S, Chen C, Bu J. Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications 2011; 61(2): 465–476.
    • (2011) Wireless Personal Communications , vol.61 , Issue.2 , pp. 465-476
    • He, D.1    Chan, S.2    Chen, C.3    Bu, J.4
  • 37
    • 84878975055 scopus 로고    scopus 로고
    • An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
    • Jiang Q, Ma J, Li G, Yang L. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications 2013; 68(4): 1477–1491.
    • (2013) Wireless Personal Communications , vol.68 , Issue.4 , pp. 1477-1491
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 38
    • 84890555385 scopus 로고    scopus 로고
    • A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
    • Wen F, Susilo W, Yang G. A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications 2013; 73(3): 993–1004.
    • (2013) Wireless Personal Communications , vol.73 , Issue.3 , pp. 993-1004
    • Wen, F.1    Susilo, W.2    Yang, G.3
  • 39
    • 84931577706 scopus 로고    scopus 로고
    • An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    • Shin S, Yeh H, Kim K. An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-peer Networking and Applications 2013; 8(4): 674–683.
    • (2013) Peer-to-peer Networking and Applications , vol.8 , Issue.4 , pp. 674-683
    • Shin, S.1    Yeh, H.2    Kim, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.