Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
Wireless Personal Communications: An International Journal
Cryptography on a Speck of Dust
Computer
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
More secure remote user authentication scheme
Computer Communications
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
International Journal of Network Management
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
Wireless Personal Communications: An International Journal
Hi-index | 0.25 |
We address the problem of mutual authentication and key agreement with user anonymity for mobile networks. Recently, Lee et al. proposed such a scheme, which is claimed to be a slight modification of, but a security enhancement on Zhu et al.'s scheme based on the smart card. In this paper, however, we reveal that both schemes still suffer from certain weaknesses which have been previously overlooked, and thus are far from the desired security. We then propose a new protocol which is immune to various known types of attacks. Analysis shows that, while achieving identity anonymity, key agreement fairness, and user friendliness, our scheme is still cost-efficient for a general mobile node.