An Anonymous Mutual Authentication with Key Agreement Protocol for Automobile Roaming System

Article Preview

Abstract:

Recently, several protocols came into being successively to meet the requirement of efficient operations in low-power roaming environment with the fast advance of communication technologies. Unfortunately, these protocols are not a suitable candidate for special requirements in automobile roaming system such as low consumption, high performance and convenience since these protocols pay more attention to a common network environment. In this paper, we address the problem of mutual authentication and key agreement with user anonymity for an automobile roaming system. More specifically, we propose the protocol employs elliptic curve cryptography system to enhance operational efficiency and take into account common attacks and give corresponding resist measures to ensure security. The analysis shows our scheme is user friendly and secure.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2407-2410

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jing Xu and so on. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks, Computer Communication. [J]. 2011(34) 319–325.

DOI: 10.1016/j.comcom.2010.04.041

Google Scholar

[2] Jianming Zhu and so on. A new authentication scheme with anonymity for wireless environments, IEEE Trans. Consum. Electron. 2004(50) 230-240.

DOI: 10.1109/tce.2004.1277867

Google Scholar

[3] Chengchi Lee and so on. Security enhancement on a new authentication scheme with anonymity for wireless environments, IEEE Transactions on Industrial Electronic. [J]. 2006(53) 1683-1686, (2006).

DOI: 10.1109/tie.2006.881998

Google Scholar

[4] Chinchen Chang and so on, Enhanced authentication scheme with anonymity for roaming service in global mobility networks, Computer Communication. [J]. 2009(32) 611-618.

DOI: 10.1016/j.comcom.2008.11.032

Google Scholar

[5] Chiachun Wu and so on, A secure authentication scheme with anonymity for wireless communications, IEEE Communications Letters. [J]. 2008(12) 722-723.

DOI: 10.1109/lcomm.2008.080283

Google Scholar

[6] Daojing He and so on, A strong user authentication scheme with smart cards for wireless communications, Computer Communication. [J]. 2011(34) 367-374.

DOI: 10.1016/j.comcom.2010.02.031

Google Scholar