Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient Privacy-Preserving Authentication in Wireless Mobile Networks

Full metadata record
DC Field Value Language
dc.contributor.authorJo, Hyo Jin-
dc.contributor.authorPaik, Jung Ha-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-05T07:20:00Z-
dc.date.available2021-09-05T07:20:00Z-
dc.date.created2021-06-15-
dc.date.issued2014-07-
dc.identifier.issn1536-1233-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/98072-
dc.description.abstractSecure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of users, there have been researches on anonymous authentication. In particular, anonymous authentication without the participation of home servers has attracted considerable interest owing to its influence on the communication efficiency. Unfortunately, the previously proposed anonymous authentication schemes have serious practical shortcomings, such as high communication and computation costs and huge revocation lists. In this paper, we propose a novel three-round anonymous roaming protocol that does not require the participation of home servers. The proposed protocol uses a pseudo-identity-based signcryption scheme to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the number of pseudo-identities stored in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols. The proposed protocol is formally proved in the Canetti-Krawczyk (CK) model.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE COMPUTER SOC-
dc.subjectKEY-EXCHANGE-
dc.subjectSECURE-
dc.subjectSCHEME-
dc.subjectARCHITECTURE-
dc.subjectPROTOCOLS-
dc.subjectSERVICES-
dc.titleEfficient Privacy-Preserving Authentication in Wireless Mobile Networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1109/TMC.2013.134-
dc.identifier.scopusid2-s2.0-84903770382-
dc.identifier.wosid000339169100007-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON MOBILE COMPUTING, v.13, no.7, pp.1469 - 1481-
dc.relation.isPartOfIEEE TRANSACTIONS ON MOBILE COMPUTING-
dc.citation.titleIEEE TRANSACTIONS ON MOBILE COMPUTING-
dc.citation.volume13-
dc.citation.number7-
dc.citation.startPage1469-
dc.citation.endPage1481-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusKEY-EXCHANGE-
dc.subject.keywordPlusSECURE-
dc.subject.keywordPlusSCHEME-
dc.subject.keywordPlusARCHITECTURE-
dc.subject.keywordPlusPROTOCOLS-
dc.subject.keywordPlusSERVICES-
dc.subject.keywordAuthorAnonymity-
dc.subject.keywordAuthorauthentication-
dc.subject.keywordAuthorCanetti-Krawczyk (CK) model-
dc.subject.keywordAuthorprivacy-
dc.subject.keywordAuthorrevocation-
dc.subject.keywordAuthorsecure roaming-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE