Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit.
Mohit GuptaNarendra S. ChaudhariPublished in: Ad Hoc Networks (2019)
Keyphrases
- authentication protocol
- network services
- smart card
- security analysis
- security protocols
- lightweight
- peer to peer
- home network
- rfid tags
- ban logic
- trusted third party
- mobile networks
- public key
- user authentication
- rfid systems
- mobile users
- mobile ip
- ns simulator
- cryptographic protocols
- mobility management
- security requirements
- password authentication
- information security
- security services
- multimedia services
- key distribution
- computer networks
- network security
- security mechanisms
- secret key
- real time
- mutual authentication
- authentication mechanism