Please use this identifier to cite or link to this item: https://idr.l4.nitk.ac.in/jspui/handle/123456789/9716
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMadhusudhan, R.
dc.contributor.authorShashidhara
dc.date.accessioned2020-03-31T06:51:20Z-
dc.date.available2020-03-31T06:51:20Z-
dc.date.issued2018
dc.identifier.citationJournal of Information Security and Applications, 2018, Vol.38, , pp.96-110en_US
dc.identifier.uri10.1016/j.jisa.2017.12.002
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/9716-
dc.description.abstractGlobal Mobile Network provides global roaming service to the users moving from one network to another. It is essential to authenticate and protect the privacy of roaming users. Recently, Marimuthu and Saravanan proposed a secure authentication scheme for roaming service in mobile networks. This scheme can protect user anonymity, untraceability, and is believed to have many abilities to resist a range of attacks in global mobile networks. In this paper, we analyse the security strength of their scheme and show that the authentication protocol is in fact insecure against insider attack, stolen-verifier attack, impersonation attack, denial-of-service attack, synchronization problem, lack of user anonymity and operational inefficiencies. Hence, we propose a secure and lightweight authentication scheme for Global Mobile Networks. In addition, the proposed scheme requires few message exchanges between the entities such as MU (Mobile User), FA (Foreign Agent) and HA (Home Agent). The scheme ensures both communication and computation efficiency as compared to the well-known authentication schemes. The performance analysis shows that the proposed authentication scheme is well suited for resource limited wireless and mobile environments. 2017 Elsevier Ltden_US
dc.titleA secure and lightweight authentication scheme for roaming service in global mobile networksen_US
dc.typeArticleen_US
Appears in Collections:1. Journal Articles

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.