2017
DOI: 10.1002/dac.3461
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments

Abstract: Summary The Global Mobility Network (GLOMONET) is rapidly becoming important as well as a popular feature in today's high‐performance network. The legal mobile users enjoy life using the ubiquitous services via GLOMONET. However, because of the broadcast nature of the wireless channel, providing user authentication along with the privacy and anonymity of the users in GLOMONET is indeed a challenging task. In this article, we come up with a secure and expeditious mobile communication environment using symmetric… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…It can be seen that the aforementioned schemes all have security vulnerabilities. Gope et al [16] proposed an authentication scheme based on symmetric keys. However, Roy and Bhattacharya [21] found various defects in the scheme of [16], including the vulnerabilities to insider attacks, offline password guessing attacks, session key leak, unauthenticated login stage, imperfect forward secrecy and inappropriate mutual authentication as well as having high database maintenance costs and synchronization problem.…”
Section: Intra-domain Identity Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…It can be seen that the aforementioned schemes all have security vulnerabilities. Gope et al [16] proposed an authentication scheme based on symmetric keys. However, Roy and Bhattacharya [21] found various defects in the scheme of [16], including the vulnerabilities to insider attacks, offline password guessing attacks, session key leak, unauthenticated login stage, imperfect forward secrecy and inappropriate mutual authentication as well as having high database maintenance costs and synchronization problem.…”
Section: Intra-domain Identity Authenticationmentioning
confidence: 99%
“…The emergence of identity authentication schemes based on symmetric polynomial represent a breakthrough in the field of IoT authentication. However, the cross-domain access process of the existing symmetric polynomial-based authentication schemes [15], [16], [17], [18] is complicated. The trusted center also cannot provide trusted traceability services to locate illegal acts, and may not be able to eliminating malicious users.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, smart home devices and appliances are not suitable for public key crypto-systems due to their limited resources for processing and communication costs [17]. However, various secure and compact schemes based on authentication and key agreement protocols can be used to ensure the security and privacy of authorized users in IoTenabled smart homes [18], [19]. As shown in Figure 1, the proposed architecture consists of a gateway and many Wi-Fi-connected IoT appliances, providing remote access and control of the smart home network to users [20].…”
Section: Related Workmentioning
confidence: 99%
“…Such security and privacy issues can enable an entity with malicious intentions also called as an attacker to expose user-related sensitive data including the daily routines, habits, and so on, and this information can be used with wicked intentions. In addition, the SDs are lightweight devices, and deploying public key-based infrastructure (PKI) is not a viable solution for the SH environments as PKI can pose high computation and communication costs on the low powered SDs [3][4][5].…”
Section: Introductionmentioning
confidence: 99%