메뉴 건너뛰기




Volumn 10, Issue 4, 2016, Pages 1370-1379

Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme with User Anonymity for Secure Communication in Global Mobility Networks

Author keywords

Anonymity; authentication; global mobility networks (GLOMONETs); privacy; smart card

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; DATA PRIVACY; ELECTRIC BATTERIES; ENERGY EFFICIENCY; HASH FUNCTIONS; MOBILE SECURITY; SMART CARDS;

EID: 85027455461     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2015.2416396     Document Type: Article
Times cited : (93)

References (33)
  • 2
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Feb
    • J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments, " IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 231-235, Feb. 2004.
    • (2004) IEEE Trans. Consum. Electron , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2
  • 3
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Oct
    • C. C. Lee, M. S. Hwang, and I. E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments, " IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1683-1687, Oct. 2006.
    • (2006) IEEE Trans. Ind. Electron , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 4
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Oct
    • C. C. Wu, W. B. Lee, and W. J. Tsaur, "A secure authentication scheme with anonymity for wireless communications, " IEEE Commun. Lett., vol. 12, no. 10, pp. 722-723, Oct. 2008.
    • (2008) IEEE Commun. Lett , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 5
    • 59649101587 scopus 로고    scopus 로고
    • Enhance authentication scheme with anonymity for roaming service in global mobility networks
    • Mar
    • C. C. Chang, C. Y. Lee, and Y. C. Chiu, "Enhance authentication scheme with anonymity for roaming service in global mobility networks, " Comput. Commun., vol. 32, no. 4, pp. 611-618, Mar. 2009.
    • (2009) Comput. Commun , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3
  • 6
    • 68349157387 scopus 로고    scopus 로고
    • Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks
    • Jul
    • T. Y. Youn, T. H. Park, and Lim, "Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks, " IEEE Commun. Lett., vol. 13, no. 7, pp. 471-473, Jul. 2009.
    • (2009) IEEE Commun. Lett , vol.13 , Issue.7 , pp. 471-473
    • Youn, T.Y.1    Park, T.H.2    Lim3
  • 7
    • 41149155794 scopus 로고    scopus 로고
    • Mobile privacy in wireless networks revisited
    • Mar
    • C. Tang and D. O. Wu, "Mobile privacy in wireless networks revisited, " IEEE Trans.Wireless Commun., vol. 7, no. 3, pp. 1035-1042, Mar. 2008.
    • (2008) IEEE Trans.Wireless Commun , vol.7 , Issue.3 , pp. 1035-1042
    • Tang, C.1    Wu, D.O.2
  • 8
    • 78549259372 scopus 로고    scopus 로고
    • On the security of an efficient mobile authentication scheme for wireless networks
    • J. Lu and J. Zhou, "On the security of an efficient mobile authentication scheme for wireless networks, " in Proc. 6th Int. Conf.WICOM, Sep. 2010, pp. 23-25.
    • (2010) Proc. 6th Int. Conf.WICOM, Sep , pp. 23-25
    • Lu, J.1    Zhou, J.2
  • 9
    • 78651364381 scopus 로고    scopus 로고
    • Provable secure authentication protocol with anonymity for roaming service in global mobility networks
    • Jan
    • T. Zhou and J. Xu, "Provable secure authentication protocol with anonymity for roaming service in global mobility networks, " Comput. Netw., vol. 55, no. 1, pp. 205-213, Jan. 2011.
    • (2011) Comput. Netw , vol.55 , Issue.1 , pp. 205-213
    • Zhou, T.1    Xu, J.2
  • 10
    • 74549210063 scopus 로고    scopus 로고
    • Universal authentication protocols for anonymous wireless communications
    • Jan
    • G. Yang, Q. Huang, W. S. Duncan, and X. Deng, "Universal authentication protocols for anonymous wireless communications, " IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 168-174, Jan. 2010.
    • (2010) IEEE Trans. Wireless Commun , vol.9 , Issue.1 , pp. 168-174
    • Yang, G.1    Huang, Q.2    Duncan, W.S.3    Deng, X.4
  • 11
    • 84856471625 scopus 로고    scopus 로고
    • Secure and efficient handover authentication based on bilinear pairing functions
    • Jan
    • D. He, C. Chen, S. Chan, and J. Bu, "Secure and efficient handover authentication based on bilinear pairing functions, " IEEE Trans. Wireless Commun., vol. 11, no. 1, pp. 48-53, Jan. 2012.
    • (2012) IEEE Trans. Wireless Commun , vol.11 , Issue.1 , pp. 48-53
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 12
    • 84865443877 scopus 로고    scopus 로고
    • Analysis and improvement of a secure and efficient handover authentication for wireless networks
    • Aug
    • D. He, C. Chen, S. Chan, and J. Bu, "Analysis and improvement of a secure and efficient handover authentication for wireless networks, " IEEE Commun. Lett., vol. 16, no. 8, pp. 1270-1273, Aug. 2012.
    • (2012) IEEE Commun. Lett , vol.16 , Issue.8 , pp. 1270-1273
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 13
    • 84890563211 scopus 로고    scopus 로고
    • Secure handover authentication protocol based on bilinear pairings
    • Dec
    • J. L. Tsai, N. W. Lo, and T. C. Wu, "Secure handover authentication protocol based on bilinear pairings, " Wireless Pers. Commun., vol. 73, no. 3, pp 1037-1047, Dec. 2013.
    • (2013) Wireless Pers. Commun , vol.73 , Issue.3 , pp. 1037-1047
    • Tsai, J.L.1    Lo, N.W.2    Wu, T.C.3
  • 14
    • 82755161699 scopus 로고    scopus 로고
    • Enhanced secure anonymous authentication scheme for roaming service in global mobile network
    • H. Mun, K. Han, Y. Lee, C. Yeun, and H. Choi, "Enhanced secure anonymous authentication scheme for roaming service in global mobile network, " Math. Comput. Model., vol. 55, pp. 214-222, 2012.
    • (2012) Math. Comput. Model , vol.55 , pp. 214-222
    • Mun, H.1    Han, K.2    Lee, Y.3    Yeun, C.4    Choi, H.5
  • 15
    • 84865142812 scopus 로고    scopus 로고
    • Improved secure anonymous authentication scheme for roaming service in global mobile network
    • J. Kim and J. Kwak, "Improved secure anonymous authentication scheme for roaming service in global mobile network, " Int. J. Security Appl., vol. 6, no. 3, pp. 45-54, 2012.
    • (2012) Int. J. Security Appl , vol.6 , Issue.3 , pp. 45-54
    • Kim, J.1    Kwak, J.2
  • 16
    • 84878975055 scopus 로고    scopus 로고
    • An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks
    • Feb
    • Q. Jiang, J. Ma, G. Li, and L. Yang, "An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks, " Wireless Pers. Commun., vol. 68, no. 4, pp. 1477-1491, Feb. 2013.
    • (2013) Wireless Pers. Commun , vol.68 , Issue.4 , pp. 1477-1491
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 17
    • 84890555385 scopus 로고    scopus 로고
    • A secure and effective user authentication scheme for roaming service in global mobility networks
    • Dec
    • F. Wen, W. Susilo, and G. Yang, "A secure and effective user authentication scheme for roaming service in global mobility networks, " Wireless Pers. Commun., vol. 73, no. 3, pp. 993-1004, Dec. 2013.
    • (2013) Wireless Pers. Commun , vol.73 , Issue.3 , pp. 993-1004
    • Wen, F.1    Susilo, W.2    Yang, G.3
  • 18
    • 84895056653 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
    • Jan
    • D. He, Y. Zhang, and J. Chen, "Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks, " Wireless Pers. Commun., vol. 74, no. 2, pp. 229-243, Jan. 2014.
    • (2014) Wireless Pers. Commun , vol.74 , Issue.2 , pp. 229-243
    • He, D.1    Zhang, Y.2    Chen, J.3
  • 19
    • 84903610110 scopus 로고    scopus 로고
    • Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets
    • Jul
    • T. Hwang and P. Gope, "Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets, " Wireless Pers. Commun., vol. 77, no. 1, pp. 197-224, Jul. 2014.
    • (2014) Wireless Pers. Commun , vol.77 , Issue.1 , pp. 197-224
    • Hwang, T.1    Gope, P.2
  • 20
    • 81455149033 scopus 로고    scopus 로고
    • An efficient delegation-based roaming payment, protocol against denial of service attacks
    • Sep
    • C. H. Wang and C. Y. Lin, "An efficient delegation-based roaming payment, protocol against denial of service attacks, " in Proc. Int. Conf. Electron., Commun. Control, pp. 4136-4140, Sep. 2011.
    • (2011) Proc. Int. Conf. Electron., Commun. Control , pp. 4136-4140
    • Wang, C.H.1    Lin, C.Y.2
  • 21
    • 84864125413 scopus 로고    scopus 로고
    • Secure delegation-based authentication protocol for wireless roaming service
    • Jul
    • J. L. Tsai, N. W. Lo, and T. C. Wu, "Secure delegation-based authentication protocol for wireless roaming service, " IEEE Commun. Lett., vol. 16, no. 7, Jul. 2012.
    • (2012) IEEE Commun. Lett , vol.16 , Issue.7
    • Tsai, J.L.1    Lo, N.W.2    Wu, T.C.3
  • 22
    • 1542593353 scopus 로고
    • Authentication and Authenticated Key Exchanges
    • Jun
    • W. Diffie, P. C. van Oorshot, and M. J. Wiener, "Authentication and Authenticated Key Exchanges, " Designs, Codes Cryptogr., vol. 2, no. 2, pp. 107-125, Jun. 1992.
    • (1992) Designs, Codes Cryptogr , vol.2 , Issue.2 , pp. 107-125
    • Diffie, W.1    Van Oorshot, P.C.2    Wiener, M.J.3
  • 23
    • 85018066264 scopus 로고    scopus 로고
    • SKEME: A versatile secure key exchange mechanism for Internet
    • Feb. 22-23
    • H. Krawczyk, "SKEME: A versatile secure key exchange mechanism for Internet, " in Proc. Symp. Netw. Distrib. Syst. Security, Feb. 22-23, 1996, pp. 114-127.
    • (1996) Proc. Symp. Netw. Distrib. Syst. Security , pp. 114-127
    • Krawczyk, H.1
  • 24
    • 78651440243 scopus 로고    scopus 로고
    • Version 4.2.0, Released 4, 3GPP TS 33.102
    • Security Architecture, Version 4.2.0, Released 4, 3GPP TS 33.102, 2001.
    • (2001) Security Architecture
  • 26
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • LNCS, Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis, " in Proc. CRYPTO, 1999, vol. 1666 LNCS, pp. 388-397, Springer-Verlag.
    • (1999) Proc. CRYPTO , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 27
    • 38049038695 scopus 로고    scopus 로고
    • Crypto++ Library. [Online] Available: http://www.cryptopp.com
    • Crypto++ Library
  • 31
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • D. R. Stinson, "Universal hashing and authentication codes, " Des. Codes Cryptogr., vol. 4, no. 4, pp. 369-380, 1994.
    • (1994) Des. Codes Cryptogr , vol.4 , Issue.4 , pp. 369-380
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.