2016
DOI: 10.1002/sec.1558
|View full text |Cite
|
Sign up to set email alerts
|

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks

Abstract: Ubiquitous networks support the roaming service for mobile communication devices. The mobile user can use the services in the foreign network with the help of the home network. Mutual authentication plays an important role in the roaming services, and researchers put their interests on the authentication schemes. Recently, in 2016, Gope and Hwang found that mutual authentication scheme of He et al. for global mobility networks had security disadvantages such as vulnerability to forgery attacks, unfair key agre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(38 citation statements)
references
References 34 publications
0
38
0
Order By: Relevance
“…In scheme proposed by Wu et al, every time the gateway gives a new PID newMU for the user [4]. But in this case, there is a potential loss of synchronization problem: if the adversary blocks the PID newMU from being sent to the user, then the two parties may lose their synchronization.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In scheme proposed by Wu et al, every time the gateway gives a new PID newMU for the user [4]. But in this case, there is a potential loss of synchronization problem: if the adversary blocks the PID newMU from being sent to the user, then the two parties may lose their synchronization.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, only the gateway could learn the identities. As for the shared key between user and sensor, in some schemes, the gateway knows the shared key in schemes [6][7][8][11][12][13][14], while, in some others, the gateway does not know the key, they use Diffie-Hellman (DH) anonymous key agreement protocol to build the shared key [1,2,4,5,9,30]. As we have discussed, the gateway is not allowed to know the shared key in order to prevent a curious gateway from eavesdropping the sensor data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Context Aware Technology is developed to predict the frequent disconnections of communication over mobile devices [10][11][12][13][14][15][16][17] die to the continuous flow of user's mobility. Quality of bandwidth may vary quickly based on user's mobility from one location to another.…”
Section: Context Aware Technologymentioning
confidence: 99%