2010
DOI: 10.1002/nem.764
|View full text |Cite
|
Sign up to set email alerts
|

A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks

Abstract: SUMMARYRecently, two authentication schemes with anonymity for roaming service in wireless networks were proposed by He et al. and Xu et al. In this paper we point out that neither of the two schemes is sufficiently practical owing to the high computational cost involved. Furthermore, we also find that both schemes still have some weaknesses which allow the attacker to trace a certain user's behaviors and thus infer his real identity. Thereafter, we propose a novel lightweight authentication scheme with anony… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…In 2010, Wu et al [13] proposed a novel lightweight authentication scheme used one-way hash functions and symmetric cryptographic operations in GLOMONET for roaming service to provide user anonymity. In 2011, Zhou and Xu [14] also proposed a provable secure two-factor authentication protocol with anonymity for roaming service based on Diffie-Hellman assumption.…”
Section: Related Workmentioning
confidence: 99%
“…In 2010, Wu et al [13] proposed a novel lightweight authentication scheme used one-way hash functions and symmetric cryptographic operations in GLOMONET for roaming service to provide user anonymity. In 2011, Zhou and Xu [14] also proposed a provable secure two-factor authentication protocol with anonymity for roaming service based on Diffie-Hellman assumption.…”
Section: Related Workmentioning
confidence: 99%
“…More authentication protocols have been proposed to overcome the anonymity issue for the roaming service in GLOMONET (Daojing He, Ma, Zhang, Chen, & Bu, 2011;Peng, Zhenfu, Kim-kwang, & Shengbao, 2009;Pu;S. Wu, Zhu, & Pu, 2011;Zhou & Xu, 2011).…”
Section: Roaming Across Wwanmentioning
confidence: 99%
“…In order to verify the identity of a legal MU and ensure anonymity of the MU to protect his or her privacy simultaneously, researchers have proposed many authentication schemes for seamless roaming over wireless communications [13][14][15][16][17][18][19][20][21][22][23]. In 2004, Zhu and Ma [23] proposed an efficient authentication scheme with anonymity for wireless communications.…”
Section: Related Workmentioning
confidence: 99%