REFERENCES

1. Forecast number of mobile users worldwide from 2020 to 2024. S. O’Dea 2020. Available from: https://www.statista.com/statistics/218984/number-of-global-mobile-users-since-2010. [Last accessed on 27 Jan 2021].

2. Jiang Q, Huang XH, Zhang N, Zhang K, Ma XD, Ma JF. Shake to communicate: secure handshake acceleration-based pairing mechanism for wrist worn devices. IEEE Internet Things 2019;6:5618-30.

3. Guo Y, Zhang Z, Guo Y. Fog-Centric authenticated key agreement scheme without trusted parties. IEEE Syst J 2020:1-10.

4. Jiang Q, Zhang N, Ni J, Ma J, Choo KKR. Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 2020;69:9390-401.

5. Aghili SF, Mala H, Shojafar M, Peris-Lopez P. Laco: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IOT. Future Gener Comp Sy 2019;96:410-24.

6. Aghili SF, Mala H, Shojafar M, Conti M. PAKIT: Proactive authentication and key agreement protocol for internet of things.. , ;.

7. Qiu SM, Wang D, Xu GA, Kumari S. Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE T Depend Secure 2020; doi: 10.1109/TDSC.2020.3022797.

8. Suzuki S, Nakada K. An authentication technique based on distributed security management for the global mobility network. IEEE J Sel Areas Commun 1997;15:1608-17.

9. Lee T, Chang C, Hwang T. Private authentication techniques for the global mobility network. Wirel Pers Commun 2005;35:329-36.

10. Lee C, Hwang M, Liao I. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 2006;53:1683-7.

11. Zhu J, Ma J. A new authentication scheme with anonymity for wireless environments. IEEE Tans Consum Electron 2004;50:231-5.

12. Chang C, Lee C, Chiu Y. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 2009;32:611-8.

13. Wu S, Zhu Y, Pu Q. A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks. Int J Netw Manag 2011;21:384-401.

14. Zhou T, Xu J. Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput Netw 2011;55:205-13.

15. He DB, Kumar N, Khan MK, Lee J. Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans Consumer Electron 2013;59:811-7.

16. He DB, Chan S, Chen C, Bu J, Fan R. Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 2011;61:465-76.

17. Jiang Q, Ma J, Li G, Yang L. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 2013;68:1477-91.

18. Wen F, Susilo W, Yang G. A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 2013;73:993-1004.

19. Lee C, Lai Y, Chen C, Chen S. Advanced secure anonymous authentication scheme for roaming service in global mobility Networks. Wirel Pers Commun 2017;94:1281-96.

20. Mun H, Han K, Lee YS, Yeun CY, Choi HH. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math Comput Model 2012;55:214-22.

21. Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X. A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks. J Netw Comput Appl 2018;107:83-92.

22. Gope P, Hwang T. Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst J 2016;10:1370-9.

23. Gupta M, Chaudhari NS. Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit. Ad Hoc Netw 2019;84:56-67.

24. Wu F, Xu LL, Kumari S, et al. An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Annales des Telecommunications 2017;72:131-44.

25. Madhusudhan R, Shashidhara R. Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. Peer Peer Netw Appl 2020;13:82-103.

26. Wang D, Wang P. Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secur Comput 2018;15:708-22.

27. Ma CG, Wang D, Zhao S. Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 2014;27:2215-27.

28. Wang D, Cheng H, He DB, Wang P. On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst J 2018;12:916-25.

29. Wang D, Wang P. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Comput Netw 2014;73:41-57.

30. Wang D, Wang N, Wang P, Qing S. Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci 2015;321:162-178.

31. Dolev D, Yao A. On the security of public key protocols. IEEE Trans Inf Theory 1983;29:198-208.

32. Wang D, Wang P. On the Implications of Zipf’s Law in Passwords, in: Computer Security - ESORICS 2016-21st European Symposiumon Research in Computer Security, 2016 Sep 26-30, Heraklion, Greece. Springer; 2016. Part I, vol. 9878 of Lecture Notes in Computer Science . pp. 111-31.

33. Wang D, He DB, Wang P, Chu C. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secur Comput 2015;12:428-42.

34. Eisenbarth TR, Kasper T, Moradi A, et al. On the power of power analysis in the real world: a complete break of the keeLoq code hopping scheme. 28th Annual International Cryptology Conference, 2008 Aug 17-21,Santa Barbara, CA, USA.Springer 2008.

35. Kocher PC, Jaffe J, Jun B. Differential Power Analysis. Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, 1999 Aug 15-16; Santa Barbara, California, USA. Springer 1999. pp. 388-97.

36. Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Trans Computers 2002;51:541-52.

37. Wang D, Zhang Z, Wang P, Yan J, Huang X. Targeted online password guessing: an underestimated threat. Proceedings ofthe 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016 Oct 24-28, Vienna, Austria. ACM 2016. pp. 1242-54.

38. Wang D, Cheng H, Wang P, Huang X, Jian G. Zipf’s Law in Passwords. IEEE Trans Inf Forensics Secur 2017;12:2776-91.

39. Agrawal S, Das ML, López J. Detection of node capture attack in wireless sensor networks. IEEE Syst J 2019;13:238-47.

40. He DB, Wang D. Robust biometrics-based authentication scheme for multi-server Environment. IEEE Syst J 2015;9:816-23.

41. Wang CY, Ding K, Li B, et al. An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environment. Wirel Commun Mob Comput 2018;3048697:1-13.

42. Wang CY, Xu GA, Li WT. A secure and anonymous two-factor authentication protocol in multiserver environment. Secur Commun Netw 2018;9062675:1-15.

43. Wang CY, Xu GA. Cryptanalysis of three password-based remote user authentication schemes with non-tamper-resistant smart card. Secur Commun Netw 2017;1619741:1-14.

44. Krawczyk H. HMQV: A high-performance secure diffie-hellman protocol. Advances in Cryptology - CRYPTO 2005: 25th AnnualInternational Cryptology Conference, 2005 Aug 14-18, Santa Barbara, California, USA. Springer 2005. pp. 546-66.

45. Wang D, Li WT, Wang P. Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inform 2018;14:4081-92.

46. Juels A, Rivest RL. Honeywords: making password-cracking detectable. 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013 Nov 4-8, Berlin, Germany. ACM 2013. pp. 145-60.

47. Wang D, Cheng H, Wang P, Yan J, Huang X. A security analysis of honeywords. 25th Annual Network and Distributed System Security Symposium, 2018 February 18-21, San Diego, California, USA. The Internet Society 2018.

48. Park D, Boyd C, Moon S. Forward secrecy and its application to future mobile communications security. Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, 2000, Jan 18-20, Melbourne, Victoria, Australia. Springer 2000. pp. 433-45.

49. Wang D, Wang P. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Comput Netw 2014;73:41-57.

50. Halevi S, Krawczyk H. Public key cryptography and password protocols. ACM Trans Inf Syst Secur 1999;2:230-268.

51. Impagliazzo R, Rudich S. Limits on the provable consequences of one-way permutations. Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 1989 May 14-17, 1989, Seattle, Washigton, USA. ACM 1989. pp. 44-61.

52. Huang X, Chen X, Li J, Xiang Y, Xu L. Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Trans Parallel Distributed Syst 2014;25:1767-75.

53. Lu Y, Xu G, Li L, Yang Y. Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility Networks. IEEE Syst J 2019;13:1454-65.

54. Odelu V, Banerjee S, Das AK, et al. A secure anonymity preserving authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 2017;96:2351-87.

55. Madhusudhan R, Shashidhara. An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks. Proceedings of the 6th International Conference on Communication and Network Security, 2016 Nov 26-29, New York, NY, USA. ACM 2016. pp. 119-26.

56. Kuo W, Wei H, Cheng J. An efficient and secure anonymous mobility network authentication scheme. J Inf Secur Appl 2014;19:18-24.

57. Srinivas J, Mishra D, Mukhopadhyay S, Kumari S, Guleria V. An authentication framework for roaming service in global mobility networks. Inf Technol Control 2019;48:129-45.

58. Li X, Niu J, Kumari S, Wu F, Choo KKR. A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Gener Comput Syst 2018;83:607-18.

59. Gope P. Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks. J Inf Secur Appl 2017;35:160-7.

60. He DB, Ma M, Zhang Y, Chen C, Bu J. A strong user authentication scheme with smart cards for wireless communications. Comput Commun 2011;34:367-74.

61. Yoon E, Yoo K, Ha K. A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 2011;37:356-64.

62. Kang M, Rhee HS, Choi J. Improved user authentication scheme with user anonymity for wireless communications. IEICE Trans Fundam Electron Commun Comput Sci 2011;94-A:860-64.

63. Li H, Yang Y, Pang L. An efficient authentication protocol with user anonymity for mobile networks. 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013 Apr 7-10, Shanghai, China. IEEE 2013. pp. 1842-47.

64. Lee H, Lee D, Moon J, et al. An improved anonymous authentication scheme for roaming in ubiquitous networks. PLOS ONE 2018;13:1-33.

65. CChaudhry SA, Albeshri A, Xiong N, Lee C, Shon T. A privacy preserving authentication scheme for roaming in ubiquitous networks. Clust Comput 2017;20:1223-36.

66. Farash MS, Chaudhry SA, Heydari M, et al. A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int J Commun Syst 2017;30:e3019.1-20.

67. Gope P, Hwang T. Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel Pers Commun 2015;82:2231-45.

68. Ghahramani M, Javidan R, Shojafar M. A secure biometric-based authentication protocol for global mobility networks in smart cities. J Supercomput 2020;76:8729-55.

69. Wu F, Li X, Xu L, Kumari S, Sangaiah AK. A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 2018;68:107-18.

70. Park K, Park Y, Park Y, Alavalapati GR, Das AK. Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 2017;5:25110-25.

71. Shashidhara R, Bojjagani S, Maurya AK, Kumari S, Xiong H. A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer Peer Netw Appl 2020;13:1943-66.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/