2021
DOI: 10.1007/s13369-021-05940-w
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Privacy-Preserving Mutual Authentication System for Global Roaming in Mobile Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…Table 3, a comparison of the communication overhead of DS2AN and other schemes 6,7,11‐14 used for authentication has been presented. DS2AN, developed using DL technique, uses lesser number of cryptographic operations which aids in the reduction of communication cost.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 3, a comparison of the communication overhead of DS2AN and other schemes 6,7,11‐14 used for authentication has been presented. DS2AN, developed using DL technique, uses lesser number of cryptographic operations which aids in the reduction of communication cost.…”
Section: Resultsmentioning
confidence: 99%
“…Shashidhara et al 6 have designed a protocol for providing a secure mutual authentication using lightweight cryptographic primitives by ensuring user anonymity, privacy, and security in global mobility networks. The protocol has been verified using AVISPA (Automated Validation of Internet Security Protocols and Applications), a widely accepted security tool for validating the authentication protocols on the public channel.…”
Section: Related Workmentioning
confidence: 99%
“…He et al [11] proposed a cross-domain authentication mechanism for mobile medical social networks, which enables two patients registered in different medical centers to achieve mutual authentication and generate session key for future secure communication. Shashidhara et al [12] proposed a lightweight authentication scheme for cross-domain access services in mobile environment, which combats mobile network transmission delay and uses a sequence of events to prevent replay attacks. Although the aforementioned schemes can ensure user anonymity, privacy and security, they use bilinear pairing, public key encryption and decryption, and symmetric encryption, which require a large amount of computation.…”
Section: Cross-domain Identity Authenticationmentioning
confidence: 99%
“…Most existing identity authentication schemes in IoT environment are based the operations such as bilinear pairing, public key encryption and decryption, and symmetric encryption [8], [9], [10], [11], [12], [13], [14]. Although these schemes are flexible, they impose high overhead and require high resources for the running entity.…”
Section: Introductionmentioning
confidence: 99%
“…Authentication, being an important aspect of the IoV system, protects against attacks due to malicious nodes entering the system [38,39]. Authentication can protect IoVs from internal and external attacks.…”
Section: Security Analysis Of the Ds2anmentioning
confidence: 99%