Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Private Authentication Techniques for the Global Mobility Network
Wireless Personal Communications: An International Journal
A new authentication protocol based on pointer forwarding for mobile communications
Wireless Communications & Mobile Computing - ISWCS'2006
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Efficient authentication protocols of GSM
Computer Communications
Security flaw of authentication scheme with anonymity for wireless communications
IEEE Communications Letters
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
Wireless Personal Communications: An International Journal
Anonymous and Authenticated Key Exchange for Roaming Networks
IEEE Transactions on Wireless Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then, we also propose a new smart card based anonymous user authentication scheme for roaming service. Compared with the existing schemes, our protocol uses a different user authentication mechanism, which does not require the home agent to share a static secret key with the foreign agent, and hence, it is more practical and realistic. We show that our proposed scheme can provide stronger security than previous protocols.