2012
DOI: 10.1016/j.mcm.2011.04.036
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced secure anonymous authentication scheme for roaming service in global mobility networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
110
1

Year Published

2013
2013
2019
2019

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 120 publications
(112 citation statements)
references
References 4 publications
1
110
1
Order By: Relevance
“…Compared with the preliminary work, the modified scheme Performance cost Estimated time (s) Mun et al [7] 11 ℎ + 4 0.2578 Li and Lee [9] 15 + 7 ℎ + 14 7.9553 Hu et al [10] 11 + 6 ℎ + 8 0.77 Chen et al [11] 6 + 16 ℎ 0.0602 Xie et al [12] 6 + 9 ℎ + 7 0.44385 Chen et al [13] 6 + 11 ℎ + 4 3.1723 Xie et al [14] 8 + 8 ℎ + 9 4.2501 Our scheme 6 + 7 ℎ + 7 0.44285…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with the preliminary work, the modified scheme Performance cost Estimated time (s) Mun et al [7] 11 ℎ + 4 0.2578 Li and Lee [9] 15 + 7 ℎ + 14 7.9553 Hu et al [10] 11 + 6 ℎ + 8 0.77 Chen et al [11] 6 + 16 ℎ 0.0602 Xie et al [12] 6 + 9 ℎ + 7 0.44385 Chen et al [13] 6 + 11 ℎ + 4 3.1723 Xie et al [14] 8 + 8 ℎ + 9 4.2501 Our scheme 6 + 7 ℎ + 7 0.44285…”
Section: Discussionmentioning
confidence: 99%
“…According to [7] schemes are more efficient than others since Chen et al 's scheme is completely based on hash and symmetric encryption/decryption operations but does not provide perfect forward secrecy and Mun et al 's scheme is vulnerable to several attacks such as impersonation attack, replay attack, man-in-the-middle attack, and verification table stolen attack. And our scheme only needs 0.44 seconds in login and key agreement which keeps low performance cost.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Therefore the attacker computes a session key KMFi h(a i b i P) using the received a i P from FA. Similarly, Kim et al's scheme [12] suffers from such impersonation attacks in the update session key phase.…”
Section: Impersonation Attackmentioning
confidence: 99%
“…Not surprising, roaming authentication schemes are a subject of active computer science research, and examples of roaming authentication schemes for smart cards include those presented in [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Smart-card-based schemes have attracted the attention of researchers due to their potential to be widely deployed.…”
Section: Introductionmentioning
confidence: 99%