Enhanced Mutual Authenticated Key Agreement Protocol for Anonymous Roaming Service in Global Mobility Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 7
Abstract
With the rapid development of mobile intelligent terminals, users can enjoy ubiquitous life in global mobility networks (GLOMONET). It is essential to secure user information for providing secure roaming service in GLOMONET. Recently, Xu et al. proposed a mutual authentication and key agreement (MAKA) protocol as the basic security building block. The purpose of this paper is not only to show some security problems in Xu et al.’s MAKA protocol and but also proposes an enhanced MAKA protocol as a remedy protocol for Xu et al.’s MAKA protocol. The proposed protocol ensures higher security compared to the well-known authentication and key agreement protocols but has a bit computational overhead than them due to the security enhancements.
Authors and Affiliations
Hyunsung Kim
An Efficient and Robust High Efficiency Video Coding Framework to Enhance Perceptual Quality of Real-Time Video Frames
Different level of compression on real-time video streaming has successfully reduced the storage space complexities and bandwidth constraints in the recent times. This paper aims to design and develop a novel concept tow...
Arabic Lexicon Learning to Analyze Sentiment in Microblogs
The study and classifying of opinions distilled from social media is called sentiment analysis. The goal of this study is to build an adaptive sentiment lexicon for Arabic language. Based on those lexicons the sentiments...
A Behavioral Study of Task Scheduling Algorithms in Cloud Computing
All the services offered by cloud computing are bundled into one service know as IT as a Service (ITaaS). The user’s processes are executed using these services. The scheduling techniques used in the cloud computing envi...
Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator
in cryptography stream ciphers used to encrypt plain text data bits one by one. The security of stream ciphers depend upon randomness of key stream, good linear span and low probability of finding the initial states of p...
Case Study of Named Entity Recognition in Odia Using Crf++ Tool
NER have been regarded as an efficient strategy to extract relevant entities for various purposes. The aim of this paper is to exploit conventional method for NER in Odia by parameterizing CRF++ tool in different ways. A...