2019
DOI: 10.1016/j.adhoc.2018.07.030
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 25 publications
0
21
0
Order By: Relevance
“…Afterwards, they proposed an authentication and key agreement protocol for GLOMONET used only hash functions and symmetric cryptosystem. While Gupta et al [23] showed that Wu et al' s scheme [24] cannot provide untraceability of the mobile user.What' s more, it' s inefficiency for the verification of the wrong password. Because there are many attacks in the existing protocols, in order to eliminate these problems, Madhusudhan and Shashidhara [25] proposed a secure authentication and key agreement scheme for mobile roaming users in 2019.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Afterwards, they proposed an authentication and key agreement protocol for GLOMONET used only hash functions and symmetric cryptosystem. While Gupta et al [23] showed that Wu et al' s scheme [24] cannot provide untraceability of the mobile user.What' s more, it' s inefficiency for the verification of the wrong password. Because there are many attacks in the existing protocols, in order to eliminate these problems, Madhusudhan and Shashidhara [25] proposed a secure authentication and key agreement scheme for mobile roaming users in 2019.…”
Section: Related Workmentioning
confidence: 99%
“…We provide a better understanding of user anonymous and untraceability, offline password guessing attack and perfect forward secrecy, etc, and we believe it would facilitate the design of secure and usability authentication and key agreement schemes for GLOMONET. Specifically, a summary of our contributions are as follows: a) We analyze Xu et al [21] 's, Gupta et al [23] ' s and Madhusudhan et al [25] ' s protocols, and find that none of the three anonymous authentication protocols in GLOMONET environment can achieve the user anonymity and untraceability, and they are vulnerable to offline password guessing attacks, and there are forward secrecy issues and mobile user impersonation attack, etc. b) We highlight four basic design principles of anonymous two-factor authentication protocol in GLOMONET:…”
Section: Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…e session keys are adopted in subsequent secure communications. Password, hard-ware, and biometrics are always utilized in authentication mechanisms [1][2][3]. Single-factor authentication only provides limited security; then, the combination of these methods together can achieve higher security.…”
Section: Introductionmentioning
confidence: 99%