2016
DOI: 10.1002/sec.1551
|View full text |Cite
|
Sign up to set email alerts
|

A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks

Abstract: As an important service, global roaming is widely used in global mobility networks to make the stable connectivity when the user goes through between different networks. To keep the security of communication, mutual authentication among the foreign agent, the home agent, and the user is a necessary part before normal data flow of the communication. Besides that, the need that the user's personal information should be protected is also an urgent task in the intercourse. Until now, a host of two‐factor authentic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 58 publications
0
4
0
Order By: Relevance
“…16 , which determines the capacity of the pool of {ID i , PW i } pairs against offline password guessing attack. 24,57 There exists 32 candidates of {ID i , PW i }, which can make an attacker A frustrated. In fact, the values 48,58 and n = 2 8 are good enough to frustrate an attacker A, where |D PW i | and |D ID i | indicate the password space and the identity space, respectively.…”
Section: User Registration Phasementioning
confidence: 99%
See 2 more Smart Citations
“…16 , which determines the capacity of the pool of {ID i , PW i } pairs against offline password guessing attack. 24,57 There exists 32 candidates of {ID i , PW i }, which can make an attacker A frustrated. In fact, the values 48,58 and n = 2 8 are good enough to frustrate an attacker A, where |D PW i | and |D ID i | indicate the password space and the identity space, respectively.…”
Section: User Registration Phasementioning
confidence: 99%
“…In order to address such security vulnerabilities, biometric‐based authentication protocols have been introduced, which are more secure and reliable due to their unique, unforgettable, unguessable, irrevocable, undistributable, and nontransferable nature . There are various frameworks based on intrinsically multiserver environments such as cloud computing, multimedical server, social networking services, and global mobility networks …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The first authentication scheme was developed by in 1989 Lamport . Since then, researchers have devised various authentication schemes for various applications such as TMIS, safety monitoring in coal mines, social multimedia networks, global mobility networks, internet of things, and session initiation protocols …”
Section: Introductionmentioning
confidence: 99%