IEEE Transactions on Wireless Communications
Optimization between security and delay of quality-of-service
Journal of Network and Computer Applications
IEEE/ACM Transactions on Networking (TON)
Secure and efficient protocol for vehicular ad hoc network with privacy preservation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
International Journal of Mobile Communications
Preventing delegation-based mobile authentications from man-in-the-middle attacks
Computer Standards & Interfaces
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
Double Delegation-Based Authentication and Key Agreement Protocol for PCSs
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
This paper proposes an efficient authentication scheme, which is suitable for low-power mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to generate a delegation passcode for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attack. Moreover, the mobile station only needs to receive one message and send one message to authenticate itself to a visitor's location register, and the scheme only requires a single elliptic-curve scalar point multiplication on a mobile device. Therefore, this scheme enjoys both computation efficiency and communication efficiency as compared to known mobile authentication schemes.