ACM Transactions on Computer Systems (TOCS)
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
Introduction to Algorithms
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
The Performance Measurement of Cryptographic Primitives on Palm Devices
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Performance Analysis of Cryptographic Protocols on Handheld Devices
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
IEEE Communications Letters
An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
MMIT '10 Proceedings of the 2010 Second International Conference on MultiMedia and Information Technology - Volume 02
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
Lightweight and provably secure user authentication with anonymity for the global mobility network
International Journal of Communication Systems
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Recently, two authentication schemes with anonymity for roaming service in wireless networks were proposed by He et al. and Xu et al. In this paper we point out that neither of the two schemes is sufficiently practical owing to the high computational cost involved. Furthermore, we also find that both schemes still have some weaknesses which allow the attacker to trace a certain user's behaviors and thus infer his real identity. Thereafter, we propose a novel lightweight authentication scheme with anonymity for roaming service in global mobility networks to overcome the aforementioned defects. Moreover, we formally analyze our proposed scheme with BAN-logic and show that it can withstand several possible attacks. Copyright © 2010 John Wiley & Sons, Ltd.