Please use this identifier to cite or link to this item:
http://idr.nitk.ac.in/jspui/handle/123456789/7270
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Madhusudhan, R. | |
dc.contributor.author | Shashidhara | |
dc.date.accessioned | 2020-03-30T09:58:44Z | - |
dc.date.available | 2020-03-30T09:58:44Z | - |
dc.date.issued | 2016 | |
dc.identifier.citation | ACM International Conference Proceeding Series, 2016, Vol., , pp.116-123 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7270 | - |
dc.description.abstract | In global mobile network, it is essential to authenticate mobile users and provide secure communication between a user, foreign agent and the home agent using session key. Designing a secure and efficient authentication protocol for roaming users in mobile network is a challenging. The authors wen et al. analyzed Jiang et al. authentication scheme recently and proved that the scheme cannot resist with replay attack and stolen-verifier attack. Later, they come up with a smart card based authentication scheme for roaming service. The Wen et al.'s scheme protects anonymity of the user and is believed to have many abilities to resist a various kind of cryptographic attacks. However, through careful analysis, we find that Wen et al.'s scheme is vulnerable to bit flipping attack, impersonation (forgery attacks), insider attack, denial-of-service attack, unfair key agreement and cannot provide user's anonymity. To remedy these weaknesses and to achieve low communication and computation costs, we proposed an efficient secure authentication scheme for roaming users in global mobile networks. The performance analysis shows that the proposed authentication protocol is simple and secure. � 2016 ACM. | en_US |
dc.title | An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.