2018
DOI: 10.1002/dac.3814
|View full text |Cite
|
Sign up to set email alerts
|

An ameliorated two‐factor anonymous key exchange authentication protocol for mobile client‐server environment

Abstract: Mobile communication is now an essential part of our day-to-day life due to expeditious progress in the industry of information technology. Prior to session key exchange with the corresponding server, a mobile user needs to be authenticated by that server in order to avail its services. Assorted authentication protocols are introduced so far, for authenticating the legitimate mobile users. Very recently, Lu et al introduced a two-factor scheme for key exchange in the mobile client-server environment. Lu et al … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…This section presents the comparison of proposed and related protocols in terms of security strength and computation performance. Table is highlighting the security strength of the proposed protocol with respect to related protocols.…”
Section: Security Features and Performance Complexity Comparisonmentioning
confidence: 77%
“…This section presents the comparison of proposed and related protocols in terms of security strength and computation performance. Table is highlighting the security strength of the proposed protocol with respect to related protocols.…”
Section: Security Features and Performance Complexity Comparisonmentioning
confidence: 77%
“…The concept of V2G network was proposed by Kempton and Tomic [13] in 2004, but the research on V2G systems today is still in its early stages. Various researchers have committed themselves to the design of V2G networks; however, most of them [14], [15], [16], [17], [18], [19], [20], [21], [22], [23] are limited to the conceptual issues related to the construction of V2G networks. Since V2G networks have emerged recently and got serious attention by the researchers on various related topics such as: its architecture, components integration and deployment etc.…”
Section: Related Workmentioning
confidence: 99%
“…The task is accomplished by formal analysis under Burrows Abadi-Needham (BAN) logic, and informal security features are explained. Moreover, the robustness of the proposed protocol is also analyzed through the automated tool, ProVerif—a widely accepted simulation tool for verification of the security of authentication protocols [35,36,37,38,39,40,41,42,43].…”
Section: Security Analysismentioning
confidence: 99%