{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:42:25Z","timestamp":1761324145693,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T00:00:00Z","timestamp":1522022400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11235-018-0446-0","type":"journal-article","created":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T15:55:58Z","timestamp":1522079758000},"page":"431-445","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks"],"prefix":"10.1007","volume":"69","author":[{"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Wazid","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,26]]},"reference":[{"issue":"1","key":"446_CR1","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/SURV.2013.070813.00285","volume":"16","author":"S Abolfazli","year":"2014","unstructured":"Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337\u2013368.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"446_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1049\/iet-ifs.2009.0154","volume":"4","author":"M Fatemi","year":"2010","unstructured":"Fatemi, M., Salimi, S., & Salahi, A. (2010). Anonymous roaming in universal mobile telecommunication system mobile networks. IET Information Security, 4(2), 93\u2013103.","journal-title":"IET Information Security"},{"issue":"7","key":"446_CR3","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TMC.2013.134","volume":"13","author":"HJ Jo","year":"2014","unstructured":"Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469\u20131481.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"9","key":"446_CR4","doi-asserted-by":"publisher","first-page":"3461","DOI":"10.1109\/TWC.2007.06020042","volume":"6","author":"G Yang","year":"2007","unstructured":"Yang, G., Wong, D. S., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 3461\u20133472.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"446_CR5","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1016\/j.jss.2011.05.006","volume":"84","author":"TF Lee","year":"2011","unstructured":"Lee, T. F., & Hwang, T. (2011). Provably secure and efficient authentication techniques for the global mobility network. Journal of Systems and Software, 84(10), 1717\u20131725.","journal-title":"Journal of Systems and Software"},{"issue":"5","key":"446_CR6","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1109\/TVT.2008.2007983","volume":"58","author":"H Zhu","year":"2009","unstructured":"Zhu, H., Lin, X., Shi, M., Ho, P. H., & Shen, X. (2009). PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks. IEEE Transactions on Vehicular Technology, 58(5), 2529\u20132543.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"11","key":"446_CR7","doi-asserted-by":"publisher","first-page":"3346","DOI":"10.1109\/TWC.2010.092410.090022","volume":"9","author":"CC Chang","year":"2010","unstructured":"Chang, C. C., & Tsai, H. C. (2010). An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. IEEE Transactions on Wireless Communications, 9(11), 3346\u20133353.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"446_CR8","doi-asserted-by":"publisher","first-page":"3168","DOI":"10.1109\/TVT.2007.900525","volume":"56","author":"M Shi","year":"2007","unstructured":"Shi, M., Rutagemwa, H., Shen, X., Mark, J. W., & Saleh, A. (2007). A service-agent-based roaming architecture for WLAN\/cellular integrated networks. IEEE Transactions on Vehicular Technology, 56(5), 3168\u20133181.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"9","key":"446_CR9","doi-asserted-by":"publisher","first-page":"11953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 11953\u20131966.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"446_CR10","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1002\/dac.1158","volume":"24","author":"C Chen","year":"2011","unstructured":"Chen, C., He, D., Chan, S., Bu, J., Gao, Y., & Fan, R. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24(3), 347\u2013362.","journal-title":"International Journal of Communication Systems"},{"key":"446_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, H., Pan, W., Liu, B., & Li, H. (2012). A lightweight anonymous authentication scheme for VANET based on bilinear pairing. In Proceedings of the 4th international conference on intelligent networking and collaborative systems (INCoS\u201912) (pp. 222\u2013228). Bucharest: IEEE.","DOI":"10.1109\/iNCoS.2012.63"},{"issue":"1","key":"446_CR12","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TETC.2015.2392380","volume":"4","author":"Y Tseng","year":"2016","unstructured":"Tseng, Y., Huang, S., Tsai, T., & Ke, J. (2016). List-free ID-based mutual authentication and key agreement protocol for multi-server architectures. IEEE Transactions on Emerging Topics in Computing, 4(1), 102\u2013112.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"1","key":"446_CR13","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TIE.2011.2130500","volume":"59","author":"CC Chang","year":"2012","unstructured":"Chang, C. C., & Lee, C. Y. (2012). A secure single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Electronics, 59(1), 629\u2013637.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"1","key":"446_CR14","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/TII.2012.2215877","volume":"9","author":"G Wang","year":"2013","unstructured":"Wang, G., Yu, J., & Xie, Q. (2013). Security analysis of a single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Informatics, 9(1), 294\u2013302.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"9","key":"446_CR15","doi-asserted-by":"publisher","first-page":"1732","DOI":"10.1002\/sec.1139","volume":"8","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks, 8(9), 1732\u20131751.","journal-title":"Security and Communication Networks"},{"issue":"1","key":"446_CR16","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TWC.2010.01.081219","volume":"9","author":"G Yang","year":"2010","unstructured":"Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9(1), 168\u2013174.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"446_CR17","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TWC.2010.120610.101018","volume":"10","author":"D He","year":"2011","unstructured":"He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431\u2013436.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"446_CR18","first-page":"533","volume-title":"Lecture Notes in Computer Science","author":"Toru Nakanishi","year":"2005","unstructured":"Nakanishi, T., & Funabiki, N. (2005). Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In Advances in cryptology (ASIACRYPT\u201905) (pp. 533\u2013548). Chennai: Springer."},{"issue":"1","key":"446_CR19","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TWC.2011.110811.111240","volume":"11","author":"D He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48\u201353.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"8","key":"446_CR20","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1109\/LCOMM.2012.061912.120941","volume":"16","author":"D He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270\u20131273.","journal-title":"IEEE Communications Letters"},{"key":"446_CR21","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-34601-9_14","volume-title":"Network and System Security","author":"Qi Han","year":"2012","unstructured":"Han, Q., Zhang, Y., Chen, X., Li, H., & Quan, J. (2012) Efficient and robust identity-based handoff authentication in wireless networks. In Proceedings of the international conference on network and system security (NSS\u201912) (pp. 180\u2013191). Fujian: Springer."},{"key":"446_CR22","doi-asserted-by":"crossref","unstructured":"Shen, A.\u00a0N., Guo, S., Zeng, D., & Guizani, M. (2012) A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In Proceedings of the of IEEE wireless communications and networking conference (WCNC\u201912) (pp. 2543\u20132548). Paris: IEEE.","DOI":"10.1109\/WCNC.2012.6214227"},{"key":"446_CR23","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.ins.2013.12.020","volume":"265","author":"X Chen","year":"2014","unstructured":"Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J., & Kim, K. (2014). Identity-based chameleon hashing and signatures without key exposure. Information Sciences, 265, 198\u2013210.","journal-title":"Information Sciences"},{"issue":"1","key":"446_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1504\/IJGUC.2015.066397","volume":"6","author":"S Javanmardi","year":"2014","unstructured":"Javanmardi, S., Shojafar, M., Shariatmadari, S., & Ahrabi, S. S. (2014). FR trust: A fuzzy reputation-based model for trust management in semantic P2P grids. International Journal of Grid and Utility Computing, 6(1), 57\u201366.","journal-title":"International Journal of Grid and Utility Computing"},{"key":"446_CR25","unstructured":"Naranjo, P. G. V., Pooranian, Z., Shojafar, M., Conti, M., & Buyya, R. (2017). Focan: A fog-supported smart city network architecture for management of applications in the internet of everything environments. arXiv preprint \n                    arXiv:1710.01801\n                    \n                  ."},{"key":"446_CR26","first-page":"515","volume-title":"Lecture Notes in Computer Science","author":"Paulo S. L. M. Barreto","year":"2005","unstructured":"Barreto, P.\u00a0S.\u00a0L.\u00a0M., Libert, B., McCullagh, N., & Quisquater, J.\u00a0J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Proceedings of advances in cryptology (ASIACRYPT\u201905) (pp. 515\u2013532). Chennai: Springer."},{"key":"446_CR27","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.adhoc.2016.02.011","volume":"44","author":"JL Tsai","year":"2016","unstructured":"Tsai, J. L., & Lo, N. W. (2016). Provably secure anonymous authentication with batch verification for mobile roaming services. Ad Hoc Networks, 44, 19\u201331.","journal-title":"Ad Hoc Networks"},{"key":"446_CR28","first-page":"453","volume-title":"Lecture Notes in Computer Science","author":"Ran Canetti","year":"2001","unstructured":"Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. In Advances in cryptology (EUROCRYPT\u201901) (pp. 453\u2013474). Innsbruck, Tyrol: Springer."},{"issue":"2","key":"446_CR29","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"446_CR30","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1(1), 36\u201363.","journal-title":"International Journal of Information Security"},{"key":"446_CR31","unstructured":"Bellare, M., Canetti, R., & Krawczyk, H. (1998). A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the thirtieth annual ACM symposium on theory of computing (STOC\u201998) (pp. 419\u2013428), Dallas, TX: ACM."},{"key":"446_CR32","unstructured":"The Network Simulator-ns-2. \n                    http:\/\/www.isi.edu\/nsnam\/ns\/\n                    \n                  . Accessed on September 2015."},{"issue":"6","key":"446_CR33","doi-asserted-by":"publisher","first-page":"3144","DOI":"10.1109\/TII.2017.2732999","volume":"13","author":"M Wazid","year":"2017","unstructured":"Wazid, M., Das, A. K., Kumar, N., & Rodrigues, J. P. C. (2017). Secure three-factor user authentication scheme for renewable energy based smart grid environment. IEEE Transactions on Industrial Informatics, 13(6), 3144\u20133153.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"446_CR34","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa, S., Wazid, M., Das, A. K., Kumar, N., Goutham Reddy, A., Yoon, E. J., et al. (2017). Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access, 5, 3028\u20133043.","journal-title":"IEEE Access"},{"key":"446_CR35","doi-asserted-by":"crossref","unstructured":"Perkins, C.\u00a0E., & Royer, E.\u00a0M. (1999). Ad-hoc on-demand distance vector routing. In Proceedings of second IEEE workshop on mobile computing systems and applications (WMCSA\u201999) (pp. 90\u2013100). New Orleans, LA.","DOI":"10.1109\/MCSA.1999.749281"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-018-0446-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-018-0446-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-018-0446-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T20:29:06Z","timestamp":1553545746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-018-0446-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,26]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["446"],"URL":"https:\/\/doi.org\/10.1007\/s11235-018-0446-0","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2018,3,26]]},"assertion":[{"value":"26 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}