作者
Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Mohammad Heydari, Sajad Sadough, S Mohammad, Saru Kumari, Muhammad Khurram Khan
发表日期
2017/3
期刊
International Journal of Communication Systems
卷号
30
期号
4
页码范围
e3019
简介
Ubiquitous networks provide roaming service for mobile nodes enabling them to use the services extended by their home networks in a foreign network. A mutual authentication scheme between the roamed mobile node and the foreign network is needed to be performed through the home network. Various authentication schemes have been developed for such networks, but most of them failed to achieve security in parallel to computational efficiency. Recently, Shin et al. and Wen et al. separately proposed two efficient authentication schemes for roaming service in ubiquitous networks. Both argued their schemes to satisfy all the security requirements for such systems. However, in this paper, we show that Shin et al.'s scheme is susceptible to: (i) user traceability; (ii) user impersonation; (iii) service provider impersonation attacks; and (iv) session key disclosure. Furthermore, we show that Wen et al.'s scheme is also …
引用总数
20162017201820192020202120222023202410151711810852
学术搜索中的文章