2013 International Symposium on Biometrics and Security Technologies 2013
DOI: 10.1109/isbast.2013.23
|View full text |Cite
|
Sign up to set email alerts
|

Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…Compared with the preliminary work, the modified scheme Performance cost Estimated time (s) Mun et al [7] 11 ℎ + 4 0.2578 Li and Lee [9] 15 + 7 ℎ + 14 7.9553 Hu et al [10] 11 + 6 ℎ + 8 0.77 Chen et al [11] 6 + 16 ℎ 0.0602 Xie et al [12] 6 + 9 ℎ + 7 0.44385 Chen et al [13] 6 + 11 ℎ + 4 3.1723 Xie et al [14] 8 + 8 ℎ + 9 4.2501 Our scheme 6 + 7 ℎ + 7 0.44285…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Compared with the preliminary work, the modified scheme Performance cost Estimated time (s) Mun et al [7] 11 ℎ + 4 0.2578 Li and Lee [9] 15 + 7 ℎ + 14 7.9553 Hu et al [10] 11 + 6 ℎ + 8 0.77 Chen et al [11] 6 + 16 ℎ 0.0602 Xie et al [12] 6 + 9 ℎ + 7 0.44385 Chen et al [13] 6 + 11 ℎ + 4 3.1723 Xie et al [14] 8 + 8 ℎ + 9 4.2501 Our scheme 6 + 7 ℎ + 7 0.44285…”
Section: Discussionmentioning
confidence: 99%
“…In this section, we demonstrate a practical scheme which is a modified version of our preliminary scheme in [12]. Some notations which will be used in this paper are defined as follows:…”
Section: The Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…So anyone can determine whether the two interactions with different FAs came from the same MU. This is a violation of both user anonymity and untraceability. In 2013, Wang mentioned a secure authentication scheme that has low efficiency, discussed in section 5. In 2013, Zhang mentioned an anonymous scheme of trusted mobile terminal, but the scheme is not efficient and it lacks untraceability and perfect forward secrecy. In 2013, Xie proposed a scheme with privacy protection and good security properties. But since the scheme uses timestamps to resist replay attacks, different entities have to synchronize time between each other, which may cause lower efficiency in Global Mobility Networks. In 2013, Kim pointed out weaknesses in Lee's, Wu's and Mun's schemes and proposed a new scheme for roaming services.…”
Section: Related Workmentioning
confidence: 99%
“…However, current authentication schemes may be vulnerable to several kinds of attacks, could disclose the roaming line of an MU and may not have enough efficiency. A secure and efficient authentication scheme should satisfy the following requirements in practice: Mutual Entity Authentication : MU, HA and FA can authenticate each other's identity and establish a session key securely after authentication.…”
Section: Introductionmentioning
confidence: 99%