2021
DOI: 10.1371/journal.pone.0247441
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving

Abstract: With the development of information technology and the Internet, users can conveniently use roaming services without time and space restrictions. This roaming service is initiated by establishing a session key between a home node, which exists in a home network, and a mobile node, which exists in a foreign network. However, in the process of verifying a legitimate user and establishing a session key, various security threats and privacy exposure issues can arise. This study demonstrates that the authentication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…For security analysis in our scheme, we consider the following attack model [ 20 , 21 , 22 ]: The attacker can extract the data in the device that stores some security parameters. The attacker can access the public communication channel, at which point the attacker can interrupt, return, amend and eliminate or transmit the message.…”
Section: Preliminariesmentioning
confidence: 99%
“…For security analysis in our scheme, we consider the following attack model [ 20 , 21 , 22 ]: The attacker can extract the data in the device that stores some security parameters. The attacker can access the public communication channel, at which point the attacker can interrupt, return, amend and eliminate or transmit the message.…”
Section: Preliminariesmentioning
confidence: 99%
“…In 2018, Baig et al proposed a new lightweight scheme to solve these issues [24]. However, in [25] have been shown the Baig et al's scheme cannot provide user privacy. They also proposed a new lightweight scheme and claimed their scheme provides user untraceability and privacy and resistance against identity/password guessing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The time of the hash function i.e. T h is considered to be 0.038 milliseconds using [25]. Comparing AMAPG with its predecessor i.e.…”
Section: Security and Performance Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…(3) A can obtain the information in the smart card and the information transmitted by the user on the secure channel during the registration process [25]. (4) A can simultaneously obtain the information in the smart card and perform offline password guessing as stated in [26,27]. (5) A can know any two of the user's password, smart card, and biological information.…”
Section: Reat Modelmentioning
confidence: 99%