2013
DOI: 10.1007/s11277-013-1243-4
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks

Abstract: In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
62
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(62 citation statements)
references
References 20 publications
0
62
0
Order By: Relevance
“…As the cost of XOR operation and module addition are rather cheap, these two operations are not included in the comparison, and only symmetric encryption/decryption operation, chaotic map operation, hash operation and modular exponential operation are evaluated. As shown in TABLE III, the computational cost of client in [9,10,13] is much cheap than PPRAS, however, as discussed previously, the scheme in Chongqing Research Program of Application Foundation and Advanced Technology (no. cstc-2014jcyjA40028, no.…”
Section: G1mentioning
confidence: 98%
See 3 more Smart Citations
“…As the cost of XOR operation and module addition are rather cheap, these two operations are not included in the comparison, and only symmetric encryption/decryption operation, chaotic map operation, hash operation and modular exponential operation are evaluated. As shown in TABLE III, the computational cost of client in [9,10,13] is much cheap than PPRAS, however, as discussed previously, the scheme in Chongqing Research Program of Application Foundation and Advanced Technology (no. cstc-2014jcyjA40028, no.…”
Section: G1mentioning
confidence: 98%
“…FA believes that HA has verified MU's anonymous identity SID. [9,12] cannot resist to the man-in-the-middle attacks, and the scheme in [10] cannot preserve the user's privacy. However, the efficiency of [11] is not desirable.…”
Section: ) Goalsmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, some new anonymous authentication schemes have been proposed [10][11][12][13][14][15][16][17]. This paper investigates these schemes based on security requirements for secure roaming services in GLOMONET and shows that most have several weaknesses.…”
Section: Introductionmentioning
confidence: 99%