Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
Constructions of truly practical secure protocols using standardsmartcards
Proceedings of the 15th ACM conference on Computer and communications security
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
An improved smart card based password authentication scheme with provable security
Computer Standards & Interfaces
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
Anonymous and Authenticated Key Exchange for Roaming Networks
IEEE Transactions on Wireless Communications
Mobile Privacy in Wireless Networks-Revisited
IEEE Transactions on Wireless Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
An efficient and provable secure PAKE scheme with robust anonymity
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
User authentication is an important security mechanism for recognizing legal roaming users. The emerging global mobility network, however, has called for new requirements for designing authentication schemes due to its dynamic nature and vulnerable-to-attack structure, which the traditional schemes overlooked, such as user anonymity. In this paper, we propose an efficient wireless authentication protocol with user anonymity for roaming service. We also introduce a formal security model suitable for roaming service in global mobility networks and show that the proposed protocol is provable secure based on this model. To the best of our knowledge, this paper offers the first formal study of anonymous authentication scheme for roaming service in global mobility networks. In addition, we point out some practical attacks on Chang et al.'s authentication scheme with user anonymity for roaming environments.