An improvement of mobile users authentication in the integration environments

被引:0
|
作者
Hwang, Min-Shiang [1 ]
Lee, Cheng-Chi [2 ]
Yang, Wei-Pang [2 ]
机构
[1] Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd, Wufeng, Taichung County 413, Taiwan
[2] Department of Computer and Information Science, National Chiao-Tung University, 1001 Ta Hsueh Road, Hsinchu 300, Taiwan
关键词
Algorithms - Computational methods - Cryptography - Data privacy - Network protocols - Security of data - Signal processing;
D O I
暂无
中图分类号
学科分类号
摘要
This paper shows that Tzeng and Tzeng's protocol has a drawback that the protocol can be easily crashed by an evil VLR attack. Therefore, we propose a slight modification to their protocol to improve their shortcoming. As a result, our protocol does not only enhance the security of Tzeng and Tzeng's protocol but also improves the efficiency. © Urban & Fischer Verlag.
引用
收藏
相关论文
共 50 条
  • [31] Anonymous and expeditious mobile user authentication scheme for GLOMONET environments
    Gope, Prosanta
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    Vijayakumar, Pandi
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (02)
  • [32] Navigation integration of a mobile robot in dynamic environments
    Song, KT
    Chang, CC
    [J]. JOURNAL OF ROBOTIC SYSTEMS, 1999, 16 (07): : 387 - 404
  • [33] MOBILE AGENT SYSTEMS INTEGRATION INTO PARALLEL ENVIRONMENTS
    Singh, David E.
    Miguel, Alejandro
    Garcia, Felix
    Carretero, Jesus
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2008, 9 (02): : 127 - 134
  • [34] Attribute-based authentication model for dynamic mobile environments
    Covington, Michael J.
    Sastry, Manoj R.
    Manohar, Deepak J.
    [J]. SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 227 - 242
  • [35] Supporting serendipitous integration in mobile computing environments
    Edwards, WK
    Newman, MW
    Sedivy, JZ
    Smith, TF
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2004, 60 (5-6) : 666 - 700
  • [36] Lightweight mobile agent authentication scheme for home network environments
    Kim, JG
    Kim, GS
    Eom, YI
    [J]. COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 853 - 859
  • [37] Activity Context Integration in Mobile Computing Environments
    Oh, Yoosoo
    [J]. DISTRIBUTED, AMBIENT, AND PERVASIVE INTERACTIONS, 2015, 9189 : 527 - 535
  • [38] Potential for mobile coverage improvement in urban environments
    Atkinson, RC
    Dunlop, J
    [J]. ICUPC '98 - IEEE 1998 INTERNATIONAL CONFERENCE ON UNIVERSAL PERSONAL COMMUNICATIONS, VOLS 1 AND 2, 1998, 1-2 : 9 - 13
  • [39] Lightweight and Secure Face-Based Active Authentication for Mobile Users
    Keykhaie, Sepehr
    Pierre, Samuel
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (03) : 1551 - 1565
  • [40] A new privacy and authentication protocol for end-to-end mobile users
    Lee, CC
    Yang, CC
    Hwang, MS
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2003, 16 (09) : 799 - 808