2020
DOI: 10.3390/sym12020287
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks

Abstract: The roaming service enables a remote user to get desired services, while roaming in a foreign network through the help of his home network. The authentication is a pre-requisite for secure communication between a foreign network and the roaming user, which enables the user to share a secret key with foreign network for subsequent private communication of data. Sharing a secret key is a tedious task due to underneath open and insecure channel. Recently, a number of such schemes have been proposed to provide aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 35 publications
0
20
0
Order By: Relevance
“…Research on this subject has two main subtopics. e first subtopic is related to personal information security [280][281][282][283]. e second subtopic is related to the data value chain, including information related to the owner's perception of privacy protection and the right to make decisions about personal information protection [96,[284][285][286][287].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Research on this subject has two main subtopics. e first subtopic is related to personal information security [280][281][282][283]. e second subtopic is related to the data value chain, including information related to the owner's perception of privacy protection and the right to make decisions about personal information protection [96,[284][285][286][287].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Furthermore, Alzahrani et al [5] had cryptanalysis Lu et al scheme [22] and showed that it is vulnerable to traceability, and has scalability issues. Alzahrani et al [5] had utilized the elliptic curve based on the elliptic curve discrete logarithm and elliptic curve Diffie Hellman (ECCDH) to protect the user anonymity in a foreign network and remote area to enjoy home network services.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, Alzahrani et al [5] had cryptanalysis Lu et al scheme [22] and showed that it is vulnerable to traceability, and has scalability issues. Alzahrani et al [5] had utilized the elliptic curve based on the elliptic curve discrete logarithm and elliptic curve Diffie Hellman (ECCDH) to protect the user anonymity in a foreign network and remote area to enjoy home network services. Although that [5] had accomplished anonymity, un-traceability, and protection against privileged insider attack, the scheme is vulnerable to the DOS attack due to heavy calculations and parameters from the first level node that makes the attacker send bogus parameters values during the communication.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations