메뉴 건너뛰기




Volumn 21, Issue 5, 2017, Pages 791-805

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city

Author keywords

Anonymity; GLOMONET; Key agreement; Smart city; User authentication

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY; SMART CITY;

EID: 85021731374     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-017-1054-9     Document Type: Article
Times cited : (28)

References (43)
  • 1
    • 84871816306 scopus 로고    scopus 로고
    • Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction
    • Au MH, Liu JK, Susilo W, Yuen TH (2013) Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor Comput Sci 469:1–14
    • (2013) Theor Comput Sci , vol.469 , pp. 1-14
    • Au, M.H.1    Liu, J.K.2    Susilo, W.3    Yuen, T.H.4
  • 2
    • 84888085041 scopus 로고    scopus 로고
    • Realizing fully secure unrestricted id-based ring signature in the standard model based on hibe
    • Au MH, Liu JK, Susilo W, Zhou J (2013) Realizing fully secure unrestricted id-based ring signature in the standard model based on hibe. IEEE Trans Inf Forensics Secur 8(12):1909– 1922
    • (2013) IEEE Trans Inf Forensics Secur , vol.8 , Issue.12 , pp. 1909-1922
    • Au, M.H.1    Liu, J.K.2    Susilo, W.3    Zhou, J.4
  • 5
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546– 2559
    • (2016) IEEE Trans Parallel Distrib Syst , vol.27 , Issue.9 , pp. 2546-2559
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5
  • 6
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200
    • (2015) IEICE Trans Commun , vol.98 , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 7
    • 84929958837 scopus 로고    scopus 로고
    • Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks
    • Gope P, Hwang T (2015) Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 82(4):2231–2245
    • (2015) Wirel Pers Commun , vol.82 , Issue.4 , pp. 2231-2245
    • Gope, P.1    Hwang, T.2
  • 8
    • 85027455461 scopus 로고    scopus 로고
    • Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
    • Gope P, Hwang T (2015) Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J. doi:10.1109/JSYST.2015.2416396
    • (2015) IEEE Syst J
    • Gope, P.1    Hwang, T.2
  • 9
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • Guo P, Wang J, Geng XH, Kim CS, Kim J-U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935
    • (2014) J Internet Technol , vol.15 , Issue.6 , pp. 929-935
    • Guo, P.1    Wang, J.2    Geng, X.H.3    Kim, C.S.4    Kim, J.-U.5
  • 10
    • 84855586177 scopus 로고    scopus 로고
    • Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks
    • He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61(2):465–476
    • (2011) Wirel Pers Commun , vol.61 , Issue.2 , pp. 465-476
    • He, D.1    Chan, S.2    Chen, C.3    Bu, J.4    Fan, R.5
  • 11
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367–374
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 12
    • 84895056653 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
    • He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243
    • (2014) Wirel Pers Commun , vol.74 , Issue.2 , pp. 229-243
    • He, D.1    Zhang, Y.2    Chen, J.3
  • 13
    • 84878975055 scopus 로고    scopus 로고
    • An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
    • Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491
    • (2013) Wirel Pers Commun , vol.68 , Issue.4 , pp. 1477-1491
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 14
    • 84903610217 scopus 로고    scopus 로고
    • An efficient ticket based authentication protocol with unlinkability for wireless access networks
    • Jiang Q, Ma J, Li G, Yang L (2014) An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel Pers Commun 77(2):1489–1506
    • (2014) Wirel Pers Commun , vol.77 , Issue.2 , pp. 1489-1506
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 15
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • Juang W-S (2004) Efficient password authenticated key agreement using smart cards. Comput Secur 23 (2):167–173
    • (2004) Comput Secur , vol.23 , Issue.2 , pp. 167-173
    • Juang, W.-S.1
  • 16
    • 79951480285 scopus 로고    scopus 로고
    • Improved user authentication scheme with user anonymity for wireless communications
    • Kang M, Rhee Y-S, Choi J-Y (2011) Improved user authentication scheme with user anonymity for wireless communications. IEICE Trans Fundam Electron Commun Comput Sci 94(2): 860–864
    • (2011) IEICE Trans Fundam Electron Commun Comput Sci , vol.94 , Issue.2 , pp. 860-864
    • Kang, M.1    Rhee, Y.-S.2    Choi, J.-Y.3
  • 17
    • 84941420224 scopus 로고    scopus 로고
    • A secure authentication scheme with user anonymity for roaming service in global mobility networks
    • Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84(3):2055–2078
    • (2015) Wirel Pers Commun , vol.84 , Issue.3 , pp. 2055-2078
    • Karuppiah, M.1    Saravanan, R.2
  • 19
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee C-C, Hwang M-S, Liao I-E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687
    • (2006) IEEE Trans Ind Electron , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.-C.1    Hwang, M.-S.2    Liao, I.-E.3
  • 20
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • Lee J-S, Chang JH, Lee DH (2009) Security flaw of authentication scheme with anonymity for wireless communications. IEEE Commun Lett 13(5):292–293
    • (2009) IEEE Commun Lett , vol.13 , Issue.5 , pp. 292-293
    • Lee, J.-S.1    Chang, J.H.2    Lee, D.H.3
  • 21
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • Li C-T, Lee C-C (2012) A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math Comput Model 55(1):35–44
    • (2012) Math Comput Model , vol.55 , Issue.1 , pp. 35-44
    • Li, C.-T.1    Lee, C.-C.2
  • 22
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
    • Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58(1): 85–95
    • (2013) Math Comput Model , vol.58 , Issue.1 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 23
    • 84883653668 scopus 로고    scopus 로고
    • An enhanced smart card based remote user password authentication scheme
    • Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371
    • (2013) J Netw Comput Appl , vol.36 , Issue.5 , pp. 1365-1371
    • Li, X.1    Niu, J.2    Khan, M.K.3    Liao, J.4
  • 24
    • 84908157951 scopus 로고    scopus 로고
    • Applying biometrics to design three-factor remote user authentication scheme with key agreement
    • Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497
    • (2014) Secur Commun Netw , vol.7 , Issue.10 , pp. 1488-1497
    • Li, X.1    Niu, J.2    Wang, Z.3    Chen, C.4
  • 25
    • 84890127621 scopus 로고    scopus 로고
    • Improvements on an authentication scheme for vehicular sensor networks
    • Liu JK, Yuen TH, Au MH, Susilo W (2014) Improvements on an authentication scheme for vehicular sensor networks. Expert Syst Appl 41(5):2559–2564
    • (2014) Expert Syst Appl , vol.41 , Issue.5 , pp. 2559-2564
    • Liu, J.K.1    Yuen, T.H.2    Au, M.H.3    Susilo, W.4
  • 26
    • 79959430513 scopus 로고    scopus 로고
    • One for all-all for one: unifying standard differential power analysis attacks
    • Mangard S, Oswald E, Standaert F-X (2011) One for all-all for one: unifying standard differential power analysis attacks. IET Inf Secur 5(2):100–110
    • (2011) IET Inf Secur , vol.5 , Issue.2 , pp. 100-110
    • Mangard, S.1    Oswald, E.2    Standaert, F.-X.3
  • 27
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
    • (2002) IEEE Trans Comput , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 28
    • 84908209248 scopus 로고    scopus 로고
    • A novel user authentication scheme with anonymity for wireless communications
    • Niu J, Li X (2014) A novel user authentication scheme with anonymity for wireless communications. Secur Commun Netw 7(10):1467–1476
    • (2014) Secur Commun Netw , vol.7 , Issue.10 , pp. 1467-1476
    • Niu, J.1    Li, X.2
  • 29
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323
    • (2015) J Internet Technol , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 30
    • 84947804555 scopus 로고    scopus 로고
    • Enhanced secure sensor association and key management in wireless body area networks
    • Shen J, Tan H, Moh S, Chung I, Liu Q, Sun X (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Networks 17(5):453–462
    • (2015) J Commun Networks , vol.17 , Issue.5 , pp. 453-462
    • Shen, J.1    Tan, H.2    Moh, S.3    Chung, I.4    Liu, Q.5    Sun, X.6
  • 31
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
    • Wang D, He D, Wang P, Chu C (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12(4): 428–442
    • (2015) IEEE Trans Dependable Secure Comput , vol.12 , Issue.4 , pp. 428-442
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.4
  • 32
    • 84938203681 scopus 로고    scopus 로고
    • Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
    • Wang D, Wang N, Wang P, Qing S (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci 321(321):162–178
    • (2015) Inf Sci , vol.321 , Issue.321 , pp. 162-178
    • Wang, D.1    Wang, N.2    Wang, P.3    Qing, S.4
  • 34
    • 84890555385 scopus 로고    scopus 로고
    • A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
    • Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 73(3):993–1004
    • (2013) Wirel Pers Commun , vol.73 , Issue.3 , pp. 993-1004
    • Wen, F.1    Susilo, W.2    Yang, G.3
  • 35
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Wu C-C, Lee W-B, Tsaur W-J (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723
    • (2008) IEEE Commun Lett , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.-C.1    Lee, W.-B.2    Tsaur, W.-J.3
  • 36
    • 84923216048 scopus 로고    scopus 로고
    • An improved and provable self-certified digital signature scheme with message recovery
    • Wu F, Xu L (2015) An improved and provable self-certified digital signature scheme with message recovery. Int J Commun Syst 28(2):344–357
    • (2015) Int J Commun Syst , vol.28 , Issue.2 , pp. 344-357
    • Wu, F.1    Xu, L.2
  • 37
    • 84978173214 scopus 로고    scopus 로고
    • A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    • Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9(16):3527– 3542
    • (2016) Secur Commun Netw , vol.9 , Issue.16 , pp. 3527-3542
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4    Das, A.K.5    Khan, M.K.6    Karuppiah, M.7    Baliyan, R.8
  • 38
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
    • (2016) IEEE Trans Parallel Distrib Syst , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 39
    • 68949149518 scopus 로고    scopus 로고
    • Security flaws in authentication protocols with anonymity for wireless environments
    • Xu J, Feng D (2009) Security flaws in authentication protocols with anonymity for wireless environments. ETRI J 31(4): 460–462
    • (2009) ETRI J , vol.31 , Issue.4 , pp. 460-462
    • Xu, J.1    Feng, D.2
  • 40
    • 84919348312 scopus 로고    scopus 로고
    • An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
    • Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260
    • (2015) Secur Commun Netw , vol.8 , Issue.2 , pp. 245-260
    • Xu, L.1    Wu, F.2
  • 41
    • 79956064800 scopus 로고    scopus 로고
    • A user friendly authentication scheme with anonymity for wireless communications
    • Yoon E-J, Yoo K-Y, Ha K-S (2011) A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364
    • (2011) Comput Electr Eng , vol.37 , Issue.3 , pp. 356-364
    • Yoon, E.-J.1    Yoo, K.-Y.2    Ha, K.-S.3
  • 42
    • 84944168470 scopus 로고    scopus 로고
    • A privacy preserving authentication scheme for roaming services in global mobility networks
    • Zhang G, Fan D, Zhang Y, Li X, Liu X (2015) A privacy preserving authentication scheme for roaming services in global mobility networks. Secur Commun Netw 8(16):2850–2859
    • (2015) Secur Commun Netw , vol.8 , Issue.16 , pp. 2850-2859
    • Zhang, G.1    Fan, D.2    Zhang, Y.3    Li, X.4    Liu, X.5
  • 43
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235
    • (2004) IEEE Trans Consum Electron , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.