DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mun, Hyeran | ko |
dc.contributor.author | Han, Kyusuk | ko |
dc.contributor.author | Lee, Yan Sun | ko |
dc.contributor.author | Yeun, Chan Yeob | ko |
dc.contributor.author | Choi, Hyo Hyun | ko |
dc.date.accessioned | 2013-03-08T16:19:54Z | - |
dc.date.available | 2013-03-08T16:19:54Z | - |
dc.date.created | 2012-03-08 | - |
dc.date.created | 2012-03-08 | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | MATHEMATICAL AND COMPUTER MODELLING, v.55, no.1-2, pp.214 - 222 | - |
dc.identifier.issn | 0895-7177 | - |
dc.identifier.uri | http://hdl.handle.net/10203/93548 | - |
dc.description.abstract | User authentication scheme is an important issue for providing secure roaming service to users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous authentication for roaming environment. In this paper, we show weaknesses of Wu-Lee-Tsaur's schemes such as failing to achieve anonymity and perfect forward secrecy, and disclosing of legitimate user's password. Therefore, we propose a new enhanced scheme that uses Elliptic Curve Diffie-Hellman (ECDH) to overcome these weaknesses and improve performance. We also demonstrate that our scheme not only overcomes these weaknesses but also provides mutual authentication and resistance to a man-in-the-middle attack. Compared with previous schemes that use public key cryptosystem with certificates, our scheme is more efficient. Moreover, our scheme does not use timestamps, so it is not required to synchronize the time. (C) 2011 Elsevier Ltd. All rights reserved. | - |
dc.language | English | - |
dc.publisher | PERGAMON-ELSEVIER SCIENCE LTD | - |
dc.subject | WIRELESS COMMUNICATIONS | - |
dc.subject | ENVIRONMENTS | - |
dc.title | Enhanced secure anonymous authentication scheme for roaming service in global mobility networks | - |
dc.type | Article | - |
dc.identifier.wosid | 000296919500023 | - |
dc.identifier.scopusid | 2-s2.0-82755161699 | - |
dc.type.rims | ART | - |
dc.citation.volume | 55 | - |
dc.citation.issue | 1-2 | - |
dc.citation.beginningpage | 214 | - |
dc.citation.endingpage | 222 | - |
dc.citation.publicationname | MATHEMATICAL AND COMPUTER MODELLING | - |
dc.identifier.doi | 10.1016/j.mcm.2011.04.036 | - |
dc.contributor.localauthor | Han, Kyusuk | - |
dc.contributor.nonIdAuthor | Mun, Hyeran | - |
dc.contributor.nonIdAuthor | Lee, Yan Sun | - |
dc.contributor.nonIdAuthor | Yeun, Chan Yeob | - |
dc.contributor.nonIdAuthor | Choi, Hyo Hyun | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Key establishment | - |
dc.subject.keywordAuthor | Anonymity | - |
dc.subject.keywordAuthor | Roaming environment | - |
dc.subject.keywordAuthor | Global mobility networks | - |
dc.subject.keywordPlus | WIRELESS COMMUNICATIONS | - |
dc.subject.keywordPlus | ENVIRONMENTS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.