2016
DOI: 10.3390/app6120393
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

Abstract: Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user's home agent in the authentication phase. By using this information, the attacker can mount distribu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 24 publications
(19 reference statements)
0
3
0
Order By: Relevance
“…This method provides complete guarantee of the user joining the network, but it also exposes his identity. The concept of Global Mobility network (GLOMONET) where mutual (anonymous) authenticated and key agreement (MAKA) protocols was originally proposed by Zhu et al [21], and followed by others [22][23][24][25][26][27][28][29][30]. These proposed protocols are evolving and are able to provide user anonymity although they rely on a preexisting relation between the connectivity provider and user where Temporary Identity (TID) is generated.…”
Section: Privacy and Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…This method provides complete guarantee of the user joining the network, but it also exposes his identity. The concept of Global Mobility network (GLOMONET) where mutual (anonymous) authenticated and key agreement (MAKA) protocols was originally proposed by Zhu et al [21], and followed by others [22][23][24][25][26][27][28][29][30]. These proposed protocols are evolving and are able to provide user anonymity although they rely on a preexisting relation between the connectivity provider and user where Temporary Identity (TID) is generated.…”
Section: Privacy and Securitymentioning
confidence: 99%
“…Temporary identity is changed only by the gateway node after a successful login phase which makes tracking possible when the mobile user tries to connect. Kai et al [22] proposed additional anonymity improvements in which a mobile node can chose when to generate a new random number to hide its temporary identity. Messages are encrypted using a foreign agent public key to prevent a denial of service attack on the home agent.…”
Section: Privacy and Securitymentioning
confidence: 99%
See 1 more Smart Citation