2015
DOI: 10.1007/s11277-015-2524-x
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
50
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 62 publications
(50 citation statements)
references
References 44 publications
0
50
0
Order By: Relevance
“…In this section, the proposed scheme is compared with the recent related works 21,[31][32][33][34]36,43 in terms of the computational cost and communication overhead. The notations used in the performance analysis are defined in Table 3.…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, the proposed scheme is compared with the recent related works 21,[31][32][33][34]36,43 in terms of the computational cost and communication overhead. The notations used in the performance analysis are defined in Table 3.…”
Section: Performance Analysismentioning
confidence: 99%
“…The notations used in the performance analysis are defined in Table 3. In Table 4, we compared the communication overhead of the proposed scheme and the related schemes 21,[31][32][33][34]36,43 in terms of the total number of bits required for all transmitted messages during the login and authentication phase. Note that it is assumed that the output of the hash function is 160-bit, a random number is 160-bit, a time stamp is 32-bit, a user identity is 128-bit, the length of a point on the elliptic curve is 320-bit, and the output of a symmetric encryption is 160-bit.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Karuppiah and Saravanan improved the scheme of Rhee et al to protect MS's identity and provide forward secrecy; the protection of the identity is achieved through an encryption using an ephemeral Diffie‐Hellman key between a MS and its HN. However, each authentication needs the involvement of the station's HN; this worsens the communication burden.…”
Section: Umts‐aka and Related Workmentioning
confidence: 99%
“…Context Aware Technology is developed to predict the frequent disconnections of communication over mobile devices [10][11][12][13][14][15][16][17] die to the continuous flow of user's mobility. Quality of bandwidth may vary quickly based on user's mobility from one location to another.…”
Section: Context Aware Technologymentioning
confidence: 99%