HomePage >> Journals >> Mathematical Computation

Mathematical Computation

Mathematical Computation is an international comprehensive professional academic journal of Ivy Publisher, concerning the development of mathematical theory and computing application on the combination of mathematical theory and modern industrial technology. The main focus of the journal is the academic papers and comments of latest theoretical and apolitical mathematics improvement in the fields of nature science, engineering technology, economy... [More] Mathematical Computation is an international comprehensive professional academic journal of Ivy Publisher, concerning the development of mathematical theory and computing application on the combination of mathematical theory and modern industrial technology. The main focus of the journal is the academic papers and comments of latest theoretical and apolitical mathematics improvement in the fields of nature science, engineering technology, economy and science, report of latest research result, aiming at providing a good communication platform to transfer, share and discuss the theoretical and technical development of mathematics theory development for professionals, scholars and researchers in this field, reflecting the academic front level, promote academic change and foster the rapid expansion of mathematics theory and application technology.

The journal receives manuscripts written in Chinese or English. As for Chinese papers, the following items in English are indispensible parts of the paper: paper title, author(s), author(s)'affiliation(s), abstract and keywords. If this is the first time you contribute an article to the journal, please format your manuscript as per the sample paper and then submit it into the online submission system. Accepted papers will immediately appear online followed by printed hard copies by Ivy Publisher globally. Therefore, the contributions should not be related to secret. The author takes sole responsibility for his views.

ISSN Print:2327-0519

ISSN Online:2327-0527

Email:mc@ivypub.org

Website: http://www.ivypub.org/mc/

  0
  0

Paper Infomation

Provable Secure Mobile User Authentication with Anonymity for the Global Mobility Network

Full Text(PDF, 85KB)

Author: Huizhi Li, Guangguo Han, Yi Wang

Abstract: Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although the proper authentication is challenging. This is because not only are wireless networks susceptible to be attacked, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been proposed. The main contribution of this article is an improvement on the schemes before, it proposes a user authentication scheme based on smart cards, requires between user and two agents are four exchanges of information, and security analysis has proved that the scheme can resist various attacks. Compared with the schemes before, this scheme is simpler and has lower computation.

Keywords: Global Mobility Network; Security; Foreign Agent

References:

[1] Chun chen, Daojing He, Sammy Chan, et al. Lightweight and provably secure user anthentication with anonymity for the global mobility network[J]. Commun. Syst, 2011, 16(6): 347-362

[2] Chenchi Lee, Minshiang Hwang, Ien Liao. Security enhancement on a new authentication scheme with anonymity for wirelessenvironments[J]. IEEE Transactions on Consumer Electronics, 2006, 53(5): 1683-1687

[3] Peng Zeng, Zhenfu Cao, Kimkwang Choo. On the anonymity of some authentication schemes for wireless communications[J]. IEEE Communications Letters, 2009, 13(3): 170-171

[4] Daojing He, Chun Chen, Sammy Chan, et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions[J]. IEEE Transactions on Consumer Electronics, 2012, 11(1): 48-53

[5] Daojing He, Yi Gao, Sammy Chan, et al. An enhanced two-factor user authentication scheme in wireless sensor networks[J]. OCP Science, 2010, 31(7): 1-11

[6] Chiachun Wu, Weibin Lee. A secure authentication scheme with anonymity for wireless communications[J]. IEE Communications Letters, 2008, 12(10): 722-723

[7] Daojing He, sammy Chan, Chun Chen, et al. Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks[J]. Springer science, 2010, 25(5): 465-476

[8] Daojing He, Sammy Chan. A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network[J]. Network-Based Information Systems. 2010, 9(10): 305-312

[9] Huixian Li, Yafang Yang, Liaojun Pang. An Efficient Authentication Protocol with user anonymity for mobile networks[J]. IEEE Wireless Communications and Networking Conference,2013,13(9): 1842-1847

[10] Arshad R, Ikram N. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl, 2013, 66(2):165-178

[11] Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang. A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 2014, 78(1), 247-269

[12] Minsu park, Hyunsung Kim, Sung Woon Lee. Privacy preserving biometric-based user authentication protocol using smart cards[J]. IEEE International Conference on Computational Science and Engineering, 2014, 14(3): 1541-1544

Privacy Policy | Copyright © 2011-2024 Ivy Publisher. All Rights Reserved.

Contact: customer@ivypub.org