Abstract

With the widespread use of mobile gadgets, security in mobile communication becomes an important issue. In 2011, Zhou et al. proposed a mutual authentication and key agreement scheme with the user anonymity for roaming environments. In this article, however, we reveal that the authentication protocol presented by Zhou et al. suffers from certain weaknesses which have been overlooked during design. As a consequence of these weaknesses, Zhou et al.’s scheme cannot achieve desired security. Therefore, here we propose a novel authentication scheme to overcome these weaknesses that is efficient, secure, and causes significantly less computational overhead as compared to Zhou et al.’s scheme.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call