2010 7th International Conference on Ubiquitous Intelligence &Amp; Computing and 7th International Conference on Autonomic &Amp 2010
DOI: 10.1109/uic-atc.2010.18
|View full text |Cite
|
Sign up to set email alerts
|

An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile Devices

Abstract: Recently, Elliptic Curve Cryptosystem (ECC) based remote authentication scheme has been used for mobile devices. For instance, Yang and Change proposed an ID-based remote mutual authentication with key agreement scheme for mobile devices on Elliptic Curve Cryptosystem in 2009. However, in this paper, we found that their scheme still is vulnerable to insider attack and impersonation attack. Therefore, we proposed an advanced ECC ID-Based remote mutual authentication scheme for mobile devices to solve the issues… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 31 publications
0
12
0
Order By: Relevance
“…This section evaluates the performance of the proposed scheme in terms computation cost of proposed scheme with other schemes [2,3,4,5,6]. To estimate the computation cost of proposed scheme, the following notations are defined: PM is the time complexity to execute elliptic curve scalar point multiplication, H is the time complexity to execute hash operation and PA is the time complexity to execute elliptic curve scalar point addition.…”
Section: Comparision With Other Schemementioning
confidence: 99%
See 1 more Smart Citation
“…This section evaluates the performance of the proposed scheme in terms computation cost of proposed scheme with other schemes [2,3,4,5,6]. To estimate the computation cost of proposed scheme, the following notations are defined: PM is the time complexity to execute elliptic curve scalar point multiplication, H is the time complexity to execute hash operation and PA is the time complexity to execute elliptic curve scalar point addition.…”
Section: Comparision With Other Schemementioning
confidence: 99%
“…However, the security of mobile communication has topped the list of concerns for mobile phone users. In 2009, Yang [6] proposed a system combining elliptic curve and identity-based cryptosystems to enhance security. They claimed that their system's secure against various attacks, such as replay attack, impersonation attack.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, several ID-based client authentication schemes [5,[9][10][11][19][20][21][22][23] have been found in literature. However, these are vulnerable to various attacks such as replay attack [5,11,20,21], privileged-insider attack [14,[23][24][25], impersonation attack [5,9], lost/stolen smartcard attack [23,24], known session-specific temporary information attack [5,11,12,14,25], and many logged-in users' attack [5,11,12,14,25].…”
Section: Related Workmentioning
confidence: 99%
“…However, these are vulnerable to various attacks such as replay attack [5,11,20,21], privileged-insider attack [14,[23][24][25], impersonation attack [5,9], lost/stolen smartcard attack [23,24], known session-specific temporary information attack [5,11,12,14,25], and many logged-in users' attack [5,11,12,14,25]. In addition, some of these schemes are faces from the problem of users' anonymity [5,11,14,25], perfect forward security [5,9] and clock synchronization [9][10][11]25]. In 2011, Debiao et al [14] proposed an ID-based client authentication with key agreement scheme on ECC for mobile client-server environments.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation