Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015, Article ID 934716, 7 pages
http://dx.doi.org/10.1155/2015/934716
Research Article

A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments

1Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2Department of Management Information Systems, National Chung Hsing University and Department of Photonics and Communication Engineering, Asia University, Taichung 413, Taiwan
3Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 621, Taiwan

Received 13 March 2015; Revised 23 October 2015; Accepted 29 October 2015

Academic Editor: Hua Lu

Copyright © 2015 Chin-Chen Chang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Ye, S. Dasiopoulou, G. Stevenson et al., “Semantic web technologies in pervasive computing: a survey and research roadmap,” Pervasive and Mobile Computing, vol. 23, pp. 1–25, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. N. Wang, N. Zhang, and T. Aaron Gulliver, “Cooperative key agreement for wireless networking: key rates and practical protocol design,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 2, pp. 272–284, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, 1981. View at Publisher · View at Google Scholar · View at Scopus
  4. C.-C. Chang and S.-J. Hwang, “Using smart cards to authenticate remote passwords,” Computers and Mathematics with Applications, vol. 26, no. 7, pp. 19–27, 1993. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  5. H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng, “An efficient and practical solution to remote authentication: smart card,” Computers and Security, vol. 21, no. 4, pp. 372–375, 2002. View at Publisher · View at Google Scholar · View at Scopus
  6. M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629–631, 2004. View at Publisher · View at Google Scholar · View at Scopus
  7. C.-L. Hsu, “Security of Chien et al.'s remote user authentication scheme using smart cards,” Computer Standards & Interfaces, vol. 26, no. 3, pp. 167–169, 2004. View at Publisher · View at Google Scholar · View at Scopus
  8. M.-S. Hwang and L.-H. Li, “A new remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28–30, 2000. View at Publisher · View at Google Scholar · View at Scopus
  9. I.-C. Lin, H.-H. Ou, and M.-S. Hwang, “Efficient access control and key management schemes for mobile agents,” Computer Standards and Interfaces, vol. 26, no. 5, pp. 423–433, 2004. View at Publisher · View at Google Scholar · View at Scopus
  10. H.-M. Sun, B.-Z. He, C.-M. Chen, T.-Y. Wu, C.-H. Lin, and H. Wang, “A provable authenticated group key agreement protocol for mobile environment,” Information Sciences, vol. 321, pp. 224–237, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  11. N. Wang, X. Song, J. Cheng, and V. C. M. Leung, “Enhancing the security of free-space optical communications with secret sharing and key agreement,” Journal of Optical Communications and Networking, vol. 6, no. 12, pp. 1072–1081, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. Y.-Y. Wang, J.-Y. Liu, F.-X. Xiao, and J. Dan, “A more efficient and secure dynamic ID-based remote user authentication scheme,” Computer Communications, vol. 32, no. 4, pp. 583–585, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. M. K. Khan, S.-K. Kim, and K. Alghathbar, “Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme,” Computer Communications, vol. 34, no. 3, pp. 305–309, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. R.-C. Wang, W.-S. Juang, and C.-L. Lei, “Robust authentication and key agreement scheme preserving the privacy of secret key,” Computer Communications, vol. 34, no. 3, pp. 274–280, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. R. C. Wang, W. S. Juang, and C. L. Lei, “A simple and efficient key exchange scheme against the smart card loss problem,” in Emerging Directions in Embedded and Ubiquitous Computing, vol. 4809 of Lecture Notes in Computer Science, pp. 728–744, 2007. View at Publisher · View at Google Scholar
  16. NIST, “Secure hash standard,” NIST FIPS PUB 180-1, National Institute of Standards and Technology, 1995, http://www.itl.nist.gov/fipspubs/fip180-1.htm. View at Google Scholar
  17. R. Rivest, “The MD5 message-digest algorithm,” RFC 1321, Internet Activities Board, Internet Privacy Task Force, 1992. View at Google Scholar
  18. National Bureau of Standards, NBA FIPS PUB 46-1, Data Encryption Standard, US Department of Commerce, National Bureau of Standards, 1988.
  19. NIST FIPS PUB, “Advanced Data Encryption Standard, National Institute of Standards and Technology,” 2001, http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
  20. B. Schneier, Applied Cryptography, Wiley, New York, NY, USA, 2nd edition, 1996.