An improvement of mobile users authentication in the integration environments

被引:0
|
作者
Hwang, Min-Shiang [1 ]
Lee, Cheng-Chi [2 ]
Yang, Wei-Pang [2 ]
机构
[1] Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd, Wufeng, Taichung County 413, Taiwan
[2] Department of Computer and Information Science, National Chiao-Tung University, 1001 Ta Hsueh Road, Hsinchu 300, Taiwan
关键词
Algorithms - Computational methods - Cryptography - Data privacy - Network protocols - Security of data - Signal processing;
D O I
暂无
中图分类号
学科分类号
摘要
This paper shows that Tzeng and Tzeng's protocol has a drawback that the protocol can be easily crashed by an evil VLR attack. Therefore, we propose a slight modification to their protocol to improve their shortcoming. As a result, our protocol does not only enhance the security of Tzeng and Tzeng's protocol but also improves the efficiency. © Urban & Fischer Verlag.
引用
收藏
相关论文
共 50 条
  • [41] Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users
    Vitello, Giuseppe
    Conti, Vincenzo
    Vitabile, Salvatore
    Sorbello, Filippo
    [J]. MOBILE INFORMATION SYSTEMS, 2015, 2015 : 1 - 13
  • [42] An authentication service against dishonest users in mobile ad hoc networks
    Ngai, ECH
    Lyu, MR
    Chin, RT
    [J]. 2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 1275 - 1285
  • [43] Efficient authentication protocol with anonymity and key protection for mobile Internet users
    Jiang, Yan
    Zhu, Youwen
    Wang, Jian
    Xiang, Yong
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 : 179 - 191
  • [44] Designing Integration of Sharing, Messaging, and Awareness for Mobile Users
    Jacucci, Giulio
    [J]. PSYCHNOLOGY JOURNAL, 2011, 9 (02): : 123 - 135
  • [45] An integration system of Web Information Sources for mobile users
    Sae-Tung, W
    Ohmori, T
    Hoshi, M
    [J]. 2000 INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM - PROCEEDINGS, 2000, : 250 - 253
  • [46] Towards automated authentication for mobile users in WLAN hot-spots
    Ott, J
    Kutscher, D
    Koch, M
    [J]. VTC2005-FALL: 2005 IEEE 62ND VEHICULAR TECHNOLOGY CONFERENCE, 1-4, PROCEEDINGS, 2005, : 1232 - 1241
  • [47] Authentication: An Overview, its types and Integration with Web and Mobile Applications
    Basavala, Sreenivasa Rao
    Kumar, Narendra
    Agarrwal, Alok
    [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 398 - 401
  • [48] Mobile device integration of a fingerprint biometric remote authentication scheme
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Hsu, Chao-Yung
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (05) : 585 - 597
  • [49] An Algorithm towards QoS Improvement of Cognitive Mobile Users
    Kundu, Anindita
    Doshi, Ishita
    Misra, Iti Saha
    Sanyal, Salil K.
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1965 - 1969
  • [50] Task-Driven Biometric Authentication of Users in Virtual Reality (VR) Environments
    Kupin, Alexander
    Moeller, Benjamin
    Jiang, Yijun
    Banerjee, Natasha Kholgade
    Banerjee, Sean
    [J]. MULTIMEDIA MODELING (MMM 2019), PT I, 2019, 11295 : 55 - 67