The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1007/s12083-021-01194-3
|View full text |Cite
|
Sign up to set email alerts
|

Desynchronization resistant privacy preserving user authentication protocol for location based services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Unfortunately, such arrangement leads to unlinkability issues under desynchronization attack. If A continuously disrupts the communication link between U i and S j by performing desynchronization attack [29,30], U i has to initiate more than one successive sessions using the same pseudonym [31]. Then, attackers can easily launch a tracing attack and link successive sessions of U i based on the transmitted pseudonym.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, such arrangement leads to unlinkability issues under desynchronization attack. If A continuously disrupts the communication link between U i and S j by performing desynchronization attack [29,30], U i has to initiate more than one successive sessions using the same pseudonym [31]. Then, attackers can easily launch a tracing attack and link successive sessions of U i based on the transmitted pseudonym.…”
Section: Related Workmentioning
confidence: 99%
“…Mobile apps, through location‐based traits, provide essential authentic information about providers (Lu et al, 2018), such as nearby locations, operating status or directions. Mobile apps, also, secure user information and usage of services (Roy & Bhattacharya, 2021). Thus, it can be concluded that authenticity is a key MSC content characteristic worthy of consideration as an antecedent of behavioural effects, this study aiming to probe further its influence.…”
Section: Theoretical Foundationmentioning
confidence: 99%
“…Table 7 shows the comparison of the computational and storage costs of the proposed protocol with other protocols on the tag. It can be seen from the table that, the protocol proposed in literature [26] uses random number operation on the tag, the one proposed in literature [31] adopts pseudorandom number operation on the tag, the one proposed in literature [32] uses modular square operation on the tag, and the protocol proposed in literature [35]- [37] applies hash function on the tag. The cost of these operations is higher than that of the bit operation used in the protocol of this study.…”
Section: Comparison On Tag Costmentioning
confidence: 99%