2016
DOI: 10.1002/sec.1598
|View full text |Cite
|
Sign up to set email alerts
|

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks

Abstract: Ubiquitous networks provide effective roaming services for mobile users (MUs). Through the worldwide roaming technology, authorized MUs can avail ubiquitous network services. Important security issues to be considered in ubiquitous networks are authentication of roaming MUs and protection of privacy of MUs. However, because of the broadcast nature of wireless channel and resource limitations of terminals, providing efficient user authentication with privacy preservation is a challenging task. Very recently, Fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 48 publications
0
25
0
Order By: Relevance
“…If we want our bot to be more interactive, we can incorporate Microsoft cognitive services such as Language Understanding Intelligence Service (LUIS) [14]. Figure 3 Shows Microsoft Bot Framework which describes how the users communicate [15,16,17,18,19] with the bot using the messenger apps. In Microsoft bot framework, the role of bot connector is very im-portant.…”
Section: Methodsmentioning
confidence: 99%
“…If we want our bot to be more interactive, we can incorporate Microsoft cognitive services such as Language Understanding Intelligence Service (LUIS) [14]. Figure 3 Shows Microsoft Bot Framework which describes how the users communicate [15,16,17,18,19] with the bot using the messenger apps. In Microsoft bot framework, the role of bot connector is very im-portant.…”
Section: Methodsmentioning
confidence: 99%
“…In this section, the proposed scheme is compared with the recent related works 21,[31][32][33][34]36,43 in terms of the computational cost and communication overhead. The notations used in the performance analysis are defined in Table 3.…”
Section: Performance Analysismentioning
confidence: 99%
“…The notations used in the performance analysis are defined in Table 3. In Table 4, we compared the communication overhead of the proposed scheme and the related schemes 21,[31][32][33][34]36,43 in terms of the total number of bits required for all transmitted messages during the login and authentication phase. Note that it is assumed that the output of the hash function is 160-bit, a random number is 160-bit, a time stamp is 32-bit, a user identity is 128-bit, the length of a point on the elliptic curve is 320-bit, and the output of a symmetric encryption is 160-bit.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Context Aware Technology is developed to predict the frequent disconnections of communication over mobile devices [10][11][12][13][14][15][16][17] die to the continuous flow of user's mobility. Quality of bandwidth may vary quickly based on user's mobility from one location to another.…”
Section: Context Aware Technologymentioning
confidence: 99%