Enhanced secure anonymous authentication scheme for roaming service in global mobility networks

@article{Mun2012EnhancedSA,
  title={Enhanced secure anonymous authentication scheme for roaming service in global mobility networks},
  author={Hyeran Mun and Kyusuk Han and Yang Sun Lee and Chan Yeob Yeun and Hyohyun Choi},
  journal={Mathematical and Computer Modelling},
  year={2012},
  volume={55},
  pages={214-222}
}
Abstract User authentication scheme is an important issue for providing secure roaming service to users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous authentication for roaming environment. In this paper, we show weaknesses of Wu–Lee–Tsaur’s schemes such as failing to achieve anonymity and perfect forward secrecy, and disclosing of legitimate user’s password. Therefore, we propose a new enhanced scheme that uses Elliptic Curve Diffie–Hellman (ECDH) to overcome… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 60 CITATIONS, ESTIMATED 94% COVERAGE

Anonymous and Lightweight Authentication for Secure Vehicular Networks

  • IEEE Transactions on Vehicular Technology
  • 2017
VIEW 15 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Secure and Efficient Anonymous Authentication Protocol for Global Roaming Services

  • 2019 11th International Conference on Communication Systems & Networks (COMSNETS)
  • 2019
VIEW 4 EXCERPTS
CITES BACKGROUND & RESULTS
HIGHLY INFLUENCED

Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services

  • 2016 11th International Conference on Availability, Reliability and Security (ARES)
  • 2016
VIEW 6 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2013
2019

CITATION STATISTICS

  • 14 Highly Influenced Citations

  • Averaged 9 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-8 OF 8 REFERENCES

Z

P. Zeng
  • Cao, K.K.R. Choo, S.Wang, On the anonymity of some authentication schemes for wireless communications, IEEE Commun. Lett. 13 (3)
  • 2009
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Guide to Elliptic Curve Cryptography

  • Springer Professional Computing
  • 2004
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

A new authentication scheme with anonymity for wireless environments

  • IEEE Trans. Consumer Electronics
  • 2004
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL