An efficient and secure anonymous mobility network authentication scheme

被引:32
|
作者
Kuo, Wen-Chung [1 ]
Wei, Hong-Ji [2 ]
Cheng, Jiin-Chiou [3 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Dept Comp Sci & Informat Engn, Touliu, Yunlin, Taiwan
[2] Univ Kang Ning, Lib & Informat Ctr, Tainan, Taiwan
[3] Southern Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Tainan, Taiwan
关键词
Authentication scheme; Anonymous authentication; Mobile networks; Roaming Elliptic curve;
D O I
10.1016/j.jisa.2013.12.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The demands of Internet users are steadily increasing. Many users access Internet services through mobile devices via wireless networks. To prevent disclosure of private data, researchers have proposed various anonymous roaming authentication schemes which apply different technologies to provide integral security properties, such as symmetric and asymmetric encryption, digital signature, timestamp, etc. Unfortunately, some of these schemes still exhibit security and efficiency issues. In order to provide tripartite authentication and enhance efficiency, we propose an efficient and secure anonymous authentication scheme for mobility networks. According to our performance and security analysis, we can prove that our proposed scheme is able to enhance efficiency and improve security in comparison to previous schemes. Crown Copyright (c) 2014 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:18 / 24
页数:7
相关论文
共 50 条
  • [1] A Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Network
    Wu, Kuo-Yang
    Chuang, Yo-Hsuan
    Wu, Tzong-Chen
    Lo, Nai-Wei
    [J]. 2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING, INTELLIGENT SYSTEM AND INFORMATION TECHNOLOGY (ICSIIT), 2017, : 150 - 154
  • [2] Computationally efficient and secure anonymous authentication scheme for cloud users
    Arasan, Anakath
    Sadaiyandi, Rajakumar
    Al-Turjman, Fadi
    Rajasekaran, Arun Sekar
    Selvi Karuppuswamy, Kalai
    [J]. Personal and Ubiquitous Computing, 2024, 28 (01) : 111 - 121
  • [3] Computationally efficient and secure anonymous authentication scheme for cloud users
    Arasan A.
    Sadaiyandi R.
    Al-Turjman F.
    Rajasekaran A.S.
    Selvi Karuppuswamy K.
    [J]. Personal and Ubiquitous Computing, 2024, 28 (1) : 111 - 121
  • [4] An Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks
    Ha, Jaecheol
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (10): : 297 - 312
  • [5] An efficient and secure anonymous authentication scheme for mobile satellite communication systems
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Hong, Jeong-Woo
    Yoon, Sang-Yoon
    Park, Dong-In
    Choi, Myung-Jin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [6] Secure and Efficient Anonymous Authentication Key Agreement Scheme for Smart Industry
    Su, Xing
    Xie, Yong
    Wang, Hui
    Liu, Wei
    Shui, Dingyi
    [J]. 2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 250 - 257
  • [7] An efficient and secure anonymous authentication scheme for mobile satellite communication systems
    Eun-Jun Yoon
    Kee-Young Yoo
    Jeong-Woo Hong
    Sang-Yoon Yoon
    Dong-In Park
    Myung-Jin Choi
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [8] Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
    Mun, Hyeran
    Han, Kyusuk
    Lee, Yan Sun
    Yeun, Chan Yeob
    Choi, Hyo Hyun
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 214 - 222
  • [9] Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
    Lee, Cheng-Chi
    Lai, Yan-Ming
    Chen, Chi-Tung
    Chen, Shun-Der
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1281 - 1296
  • [10] A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
    Dawei Zhao
    Haipeng Peng
    Lixiang Li
    Yixian Yang
    [J]. Wireless Personal Communications, 2014, 78 : 247 - 269