ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications

In terms of convenience requirements, mobile communications have become one of the most important roaming services for wireless environments. Especially, how to prevent unauthorized users from illegitimate accesses in mobile communication systems has become an important issue. Password authentication with smart card is one of the mechanisms that were widely used to authenticate the validity of ...

متن کامل

An Efficient Authentication Protocol for Mobile Networks

Many existing authentication protocols supporting inter-domain authentication on the Internet require their clients to communicate with every involved key distribution center (KDC) directly. This is inefficient and costly when the client side is a wireless mobile unit, for wireless transmission has relatively lower bandwidth, and a mobile unit is battery powered. In this paper, we present a mob...

متن کامل

A Secure and Efficient Authentication Protocol for Mobile RFID Systems

AbstrAct: The design of a secure communication scheme for Radio Frequency Identification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an RFID reader and its backend server is secure and concentrate on the security enhancemen...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Secure and Efficient Authentication Protocol for Power System Computer Networks

In this paper, we propose an efficient and secure Authentication Protocol for Power systems (APP). The security analysis shows that APP is secure and resilient to various kinds of attacks. The numerical analysis and simulation results shows that APP is more efficient than TLS, a public-key based authentication protocol recommended by IEC61850.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sādhanā

سال: 2018

ISSN: 0256-2499,0973-7677

DOI: 10.1007/s12046-018-0879-x