global mobility network
Recently Published Documents


TOTAL DOCUMENTS

17
(FIVE YEARS 1)

H-INDEX

6
(FIVE YEARS 0)

PLoS ONE ◽  
2021 ◽  
Vol 16 (2) ◽  
pp. e0247441
Author(s):  
Dongwoo Kang ◽  
Hakjun Lee ◽  
Youngsook Lee ◽  
Dongho Won

With the development of information technology and the Internet, users can conveniently use roaming services without time and space restrictions. This roaming service is initiated by establishing a session key between a home node, which exists in a home network, and a mobile node, which exists in a foreign network. However, in the process of verifying a legitimate user and establishing a session key, various security threats and privacy exposure issues can arise. This study demonstrates that the authentication scheme for the roaming service proposed in the existing Global Mobility Network (GLOMONET) environment has several vulnerabilities and, hence, is impractical. In addition, the scheme does not satisfy the privacy of the session key or user’s identity or password. Accordingly, we propose a new lightweight authentication scheme to compensate for these vulnerabilities and secure a high level of privacy, such as non-traceability. In addition, formal and informal analyses are conducted to examine the safety of the proposed scheme. Based on the results of our analyses, we prove that the proposed scheme is highly secure and applicable to the actual GLOMONET environment.


2013 ◽  
Vol 23 (03) ◽  
pp. 1350009
Author(s):  
SONG-KONG CHONG ◽  
CHENG-CHI LEE ◽  
MIN-SHIANG HWANG

In this paper, we shall point out that an authentication scheme for the global mobility network (GLOMONET) is insecure. An insider attacker can obtain a authentication key of a user by means of a legal procedure, and because of this weakness, the attacker can make free calls surreptitiously. Therefore, we shall propose an improved authentication scheme to protect the security of GLOMONET.


2013 ◽  
Vol 74 (2) ◽  
pp. 601-614 ◽  
Author(s):  
Qi Xie ◽  
Bin Hu ◽  
Xiao Tan ◽  
Mengjie Bao ◽  
Xiuyuan Yu

2013 ◽  
Vol 2013 ◽  
pp. 1-12 ◽  
Author(s):  
Jun-Sub Kim ◽  
Jin Kwak

In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.


Sign in / Sign up

Export Citation Format

Share Document