Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2013 (2013), Article ID 302582, 12 pages
http://dx.doi.org/10.1155/2013/302582
Research Article

Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

1ISAA Lab, Department of Information Security Engineering, Soonchunhyang University, Asan, Chungchungnam-do 336-745, Republic of Korea
2Department of Information Security Engineering, Soonchunhyang University, Asan, Chungchungnam-do 336-745, Republic of Korea

Received 28 August 2013; Accepted 16 September 2013

Academic Editor: Jongsung Kim

Copyright © 2013 Jun-Sub Kim and Jin Kwak. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Suzuki and K. Nakada, “An authentication technique based on distributed security management for the global mobility network,” IEEE Journal on Selected Areas in Communications, vol. 15, no. 8, pp. 1608–1617, 1997. View at Publisher · View at Google Scholar · View at Scopus
  2. D. He and S. Chan, “A secure and lightweight user authentication scheme with anonymity for the global mobility network,” in Proceedings of the 13th International Conference on Network-Based Information Systems (NBiS '10), pp. 305–312, Takayama, Japan, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Buttyán, C. Gbaguidi, and S. Staamann, “Extensions to an authentication technique proposed for the global mobility network,” IEEE Transactions on Communications, vol. 48, no. 3, pp. 373–376, 2000. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 231–235, 2004. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Lee, M. Hwang, and I. Liao, “Security enhancement on a new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683–1687, 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Wu, W. Lee, and W. Tsaur, “A secure authentication scheme with anonymity for wireless communications,” IEEE Communications Letters, vol. 12, no. 10, pp. 722–723, 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Zeng, Z. Cao, K. R. Choo, and S. Wang, “On the anonymity of some authentication schemes for wireless communications,” IEEE Communications Letters, vol. 13, no. 3, pp. 170–171, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Lee, J. H. Chang, and D. H. Lee, “Security flaw of authentication scheme with anonymity for wireless communications,” IEEE Communications Letters, vol. 13, no. 5, pp. 292–293, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Chang, C. Lee, and Y. Chiu, “Enhanced authentication scheme with anonymity for roaming service in global mobility networks,” Computer Communications, vol. 32, no. 4, pp. 611–618, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. T. Youn, Y. Park, and J. Lim, “Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks,” IEEE Communications Letters, vol. 13, no. 7, pp. 471–473, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu, “A strong user authentication scheme with smart cards for wireless communications,” Computer Communications, vol. 34, no. 3, pp. 367–374, 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. H. Mun, K. Han, Y. S. Lee, C. Y. Yeun, and H. H. Choi, “Enhanced secure anonymous authentication scheme for roaming service in global mobility networks,” Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 214–222, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  13. Q. Pu, “An enhanced authentication scheme with anonymity for roaming service in global mobility networks,” in Proceedings of the 2nd International Conference on MultiMedia and Information Technology (MMIT '10), pp. 219–222, Kaifeng, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. T. Zhou and J. Xu, “Provable secure authentication protocol with anonymity for roaming service in global mobility networks,” Computer Networks, vol. 55, no. 1, pp. 205–213, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. T. Lee and T. Hwang, “Provably secure and efficient authentication techniques for the global mobility network,” Journal of Systems and Software, vol. 84, no. 10, pp. 1717–1725, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. C. C. Lee, Y. M. Lai, and C. T. Li, “An improved secure dynamic ID based remote user authentication scheme for multi-server environment,” International Journal of Security and Its Applications, vol. 6, pp. 203–210, 2012. View at Google Scholar
  17. Y. An and Y. Joo, “Security analysis and improvements of a password-based mutual authentication scheme with session key agreement,” International Journal of Security and Its Applications, vol. 7, pp. 85–94, 2013. View at Google Scholar
  18. J. S. Kim and J. Kwak, “Improved secure anonymous authentication scheme for roaming service in global mobility networks,” International Journal of Security and Its Applications, vol. 6, pp. 45–54, 2012. View at Google Scholar