2018
DOI: 10.1016/j.jnca.2018.02.003
|View full text |Cite
|
Sign up to set email alerts
|

A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 69 publications
(50 citation statements)
references
References 28 publications
0
50
0
Order By: Relevance
“…This method provides complete guarantee of the user joining the network, but it also exposes his identity. The concept of Global Mobility network (GLOMONET) where mutual (anonymous) authenticated and key agreement (MAKA) protocols was originally proposed by Zhu et al [21], and followed by others [22][23][24][25][26][27][28][29][30]. These proposed protocols are evolving and are able to provide user anonymity although they rely on a preexisting relation between the connectivity provider and user where Temporary Identity (TID) is generated.…”
Section: Privacy and Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…This method provides complete guarantee of the user joining the network, but it also exposes his identity. The concept of Global Mobility network (GLOMONET) where mutual (anonymous) authenticated and key agreement (MAKA) protocols was originally proposed by Zhu et al [21], and followed by others [22][23][24][25][26][27][28][29][30]. These proposed protocols are evolving and are able to provide user anonymity although they rely on a preexisting relation between the connectivity provider and user where Temporary Identity (TID) is generated.…”
Section: Privacy and Securitymentioning
confidence: 99%
“…Chain of trust is the basis for the GLOBONET concept and MAKA protocol. Proposals from [21][22][23][24][25][26][27][28][29][30] provide device identity confirmation through a home agent. This identity does not provide device scope, therefore, identity of a device which is a BLE sniffer and profiler can be validated.…”
Section: Se-co Chain Of Trust and Privacymentioning
confidence: 99%
“…Figure depicts the column chart illustration of the computational cost. As Figure shows, schemes have better execution time; however, they are susceptible to several known attacks and cannot provide the perfect forward secrecy.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…Thus, in order to resist the security drawbacks of previous schemes, Odelu et al have introduced an effective authentication protocol for roaming services in GLOMONETs. Last but not least, Xu et al have presented an efficient anonymity‐preserving mutual authentication and session key agreement protocol for roaming services in GLOMONETs.…”
Section: Introductionmentioning
confidence: 99%
“…grid [4] and intelligent manufacturing [5], [6]. The WSS is a type of distributed, multihop and self-configuring sensor system that is equipped with an enormous number of sensor nodes [7], [8]. The sensors, which are limited in power, storage and resources in deployed systems, transfer data via dint of the wireless signal [9].…”
mentioning
confidence: 99%