Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 55

Full-Text Articles in Science and Technology Studies

Key Characteristics-Based Sensor Distribution In Multi-Station Assembly Processes, Nagesh Shukla, Darek Ceglarek, Manoj K. Tiwari Apr 2015

Key Characteristics-Based Sensor Distribution In Multi-Station Assembly Processes, Nagesh Shukla, Darek Ceglarek, Manoj K. Tiwari

Nagesh Shukla

This paper presents a novel approach for optimal key characteristics-based sensor distribution in a multi-station assembly process, for the purpose of diagnosing variation sources responsible for product quality defects in a timely manner. Current approaches for sensor distribution are based on the assumption that measurement points can be allocated at arbitrary locations on the part or subassembly. This not only presents challenges in the implementation of these approaches but additionally does not allow required product assurance and quality control standards to be integrated with them, due to lack of explicit relations between measured features and geometric dimensioning and tolerancing (GD ...


Algorithm Portfolios For Logistics Optimization Considering Stochastic Demands And Mobility Allowance, N Shukla, A K. Choudhary, P Prakash, K J. Fernandes, M K. Tiwari Apr 2015

Algorithm Portfolios For Logistics Optimization Considering Stochastic Demands And Mobility Allowance, N Shukla, A K. Choudhary, P Prakash, K J. Fernandes, M K. Tiwari

Nagesh Shukla

The vehicle routing problem with stochastic demand (VRPSD) is a well known NP-hard problem. The uncharacteristic behaviour associated with the problem enhances the computational efforts required to obtain a feasible and near-optimal solution. This paper proposes an algorithm portfolio methodology based on evolutionary algorithms, which takes into account the stochastic nature of customer demand to solve this computationally complex problem. These problems are well known to have computationally complex objective functions, which make their solutions hard to find, particularly when problem instances of large dimensions are considered. Of particular importance in such situations is the timeliness of the solution. For ...


Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu Mar 2014

Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu

Professor Willy Susilo

Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from the same domain (intra-domain) are considered. We note that one of the main applications of identity-based proxy re-encryption schemes is in the cloud computing scenario. Nevertheless, in this scenario, users in different domains can share files with each other. Therefore, the existing solutions do ...


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang Mar 2014

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang

Professor Willy Susilo

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then ...


Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou Mar 2014

Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou

Professor Willy Susilo

Linkable ring signatures have found many attractive applications. One of the recent important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately, the existing LTRS schemes are only secure in the random oracle model (ROM). In this paper, we make the following contributions. First, we construct the first LTRS scheme that is secure without requiring the ROM. Further, we enhance the security of a threshold ring signature (for both linkable or non-linkable) by providing a stronger definition of anonymity. This strengthened notion makes threshold ring signature schemes more suitable in real life. Finally, we provide efficient schemes that outperform ...


Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta Mar 2014

Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in ...


Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson Jan 2014

Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson

Associate Professor Linda Dawson

Gestural Interface Technology (GIT) has changed the way technology is adopted in classrooms for all ages. The accessibility of control through touch means that technology such as Apple's iPad can be used in early childhood education. In this paper, we introduce a framework for fully-engaged communication, developed from educational pedagogy and critical engagement in information systems. The intersection of these dimensions creates a view of a GIT lifeworld approach which allows it to be used to understand multiple layers of engagement that exist within an early childhood education environment.


Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta Jan 2014

Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta

M. G. Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in ...


Order-4 Quasi-Orthogonal Cooperative Communication In Stfc Mb-Ofdm Uwb, Zixuan Lin, Le Chung Tran, Farzad Safaei, Tadeusz A. Wysocki Jun 2013

Order-4 Quasi-Orthogonal Cooperative Communication In Stfc Mb-Ofdm Uwb, Zixuan Lin, Le Chung Tran, Farzad Safaei, Tadeusz A. Wysocki

Professor Farzad Safaei

Recently, cooperative communication and Space-Time-Frequency-Codes (STFCs) have been introduced into the Multiband OFDM Ultra-Wideband (MB-OFDM UWB) to improve the reliability, data rate and system capacity. This paper proposes a cooperative communication scheme for a four source node MB-OFDM UWB system using Quasi-Orthogonal STFCs, which is referred to as order-4 Quasi-Orthogonal Cooperative Communication Scheme (4-QOCCS). Simulation results show that the proposed 4-QOCCS provides significantly better error performance over the conventional MB-OFDM UWB and our order-2 Orthogonal Cooperative Communication Scheme (2-OCCS) using the Alamouti STFCs, and even better than the order-4 Orthogonal Cooperative Communication Scheme (4-OCCS), which we have been recently proposed ...


Integrated Seat And Suspension Control For A Quarter Car With Driver Model, Haiping Du, Weihua Li, Nong Zhang Feb 2013

Integrated Seat And Suspension Control For A Quarter Car With Driver Model, Haiping Du, Weihua Li, Nong Zhang

Professor Weihua Li

In this paper, an integrated vehicle seat and sus pension control strategy for a quarter car with driver model is proposed to improve suspension performance on driver ride comfort. An integrated seat and suspension model that includes a quarter-car suspension, a seat suspension, and a 4-degree-of freedom (DOM) driver body model is presented first. This in1 tegrated model provides a platform to evaluate ride comfort 1performance in terms of driver head acceleration responses under typical road disturbances and to develop an integrated control of seat and car suspensions. Based on the integrated model, an H∞ state feedback controller is designed ...


The Joint Effect Of Image Blur And Illumination Distortions For Mobile Visual Search Of Print Media, Yi Cao, Christian Ritz, Raad Raad Jan 2013

The Joint Effect Of Image Blur And Illumination Distortions For Mobile Visual Search Of Print Media, Yi Cao, Christian Ritz, Raad Raad

Faculty of Engineering and Information Sciences - Papers: Part A

Mobile Visual Search (MVS) is an emerging area of research given the explosion of smart and powerful mobile devices. Typically, the performance of MVS applications is influenced by the implemented image processing algorithms as well as various distortions that occur when capturing images by the mobile camera. This paper examines the joint effect of two common distortions, namely the illumination changes and image blurring on image matching accuracy for print media when using four state-of-the art local feature algorithms. Results obtained for a database of real camera images captured by two different camera models show that the illumination changes have ...


Some New Constructions Of Orthogonal Designs, Tianbing Xia, Jennifer Seberry, Mingyuan Xia, Shangli Zhang Jan 2013

Some New Constructions Of Orthogonal Designs, Tianbing Xia, Jennifer Seberry, Mingyuan Xia, Shangli Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper we construct OD(4pqr(q+1); pqr, pqr, pqr, pqr, pqr+1, pqr+1, pqr+1, pqr+1) for each core order q ≡ 3(mod 4), r ≥ 0 or q = 1, p odd, p ≤ 21 and p ∈ {25, 49}, and COD(2qr(q + 1); qr, qr, qr+1, qr+1) for any prime power q ≡ 1 (mod 4) (including q = 1), r ≥ 0.


Social Media Influence On Viewer Engagement, Mark Freeman, Matthew Halliwell, Alison E. Freeman Jan 2013

Social Media Influence On Viewer Engagement, Mark Freeman, Matthew Halliwell, Alison E. Freeman

Faculty of Engineering and Information Sciences - Papers: Part A

Society is being reshaped through Social Media. The case of Social Media integration into the London 2012 Olympics mainstream media coverage is used to demonstrate this. Social Media has modified television viewing from a passive to an active activity. It has also allowed opinions to be shared more quickly and broadly. Analysis of practical examples through the theoretical lens of sociomateriality demonstrates that greater use of the components in the 'Theoretical Framework of Member Needs' reflect the presence of viewers who are more active. This paper discusses the inability to separate the use of technology from its social context, the ...


Improving Graph Matching Via Density Maximization, Chao Wang, Lei Wang, Lingqiao Liu Jan 2013

Improving Graph Matching Via Density Maximization, Chao Wang, Lei Wang, Lingqiao Liu

Faculty of Engineering and Information Sciences - Papers: Part A

Graph matching has been widely used in various applications in computer vision due to its powerful performance. However, it poses three challenges to image sparse feature matching: (1) The combinatorial nature limits the size of the possible matches, (2) It is sensitive to outliers because the objective function prefers more matches, (3) It works poorly when handling many-to-many object correspondences, due to its assumption of one single cluster for each graph. In this paper, we address these problems with a unified framework-Density Maximization. We propose a graph density local estimator (DLE) to measure the quality of matches. Density Maximization aims ...


Probabilistic Fuzzy Image Fusion Approach For Radar Through Wall Sensing, C H. Seng, A Bouzerdoum, M G. Amin, S L Phung Jan 2013

Probabilistic Fuzzy Image Fusion Approach For Radar Through Wall Sensing, C H. Seng, A Bouzerdoum, M G. Amin, S L Phung

Faculty of Engineering and Information Sciences - Papers: Part A

This paper addresses the problem of combining multiple radar images of the same scene to produce a more informative composite image. The proposed approach for probabilistic fuzzy logic-based image fusion automatically forms fuzzy membership functions using the Gaussian-Rayleigh mixture distribution. It fuses the input pixel values directly without requiring fuzzification and defuzzification, thereby removing the subjective nature of the existing fuzzy logic methods. In this paper, the proposed approach is applied to through-the-wall radar imaging in urban sensing and evaluated on real multiview and polarimetric data. Experimental results show that the proposed approach yields improved image contrast and enhances target ...


Evidence-Free Policy: The Case Of The National Injury Insurance Scheme, Mark Harrison Jan 2013

Evidence-Free Policy: The Case Of The National Injury Insurance Scheme, Mark Harrison

Faculty of Engineering and Information Sciences - Papers: Part A

The Productivity Commission report 'Disability Care and Support' recommends tort liability be replaced by a compulsory, government-run, no-fault scheme. But theory and evidence indicate moving to a no-fault scheme will increase the accident rate. Even a move from non-risk-rated third-party insurance to non-risk-rated first-party insurance reduces incentives for care. A no-fault scheme is not superior to current policies; genuine reform will need to be informed by law and economics literature.


Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson Jan 2013

Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson

Faculty of Engineering and Information Sciences - Papers: Part A

Gestural Interface Technology (GIT) has changed the way technology is adopted in classrooms for all ages. The accessibility of control through touch means that technology such as Apple's iPad can be used in early childhood education. In this paper, we introduce a framework for fully-engaged communication, developed from educational pedagogy and critical engagement in information systems. The intersection of these dimensions creates a view of a GIT lifeworld approach which allows it to be used to understand multiple layers of engagement that exist within an early childhood education environment.


Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu Jan 2013

Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu

Faculty of Engineering and Information Sciences - Papers: Part A

Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from the same domain (intra-domain) are considered. We note that one of the main applications of identity-based proxy re-encryption schemes is in the cloud computing scenario. Nevertheless, in this scenario, users in different domains can share files with each other. Therefore, the existing solutions do ...


Algorithm Portfolios For Logistics Optimization Considering Stochastic Demands And Mobility Allowance, N Shukla, A K. Choudhary, P Prakash, K J. Fernandes, M K. Tiwari Jan 2013

Algorithm Portfolios For Logistics Optimization Considering Stochastic Demands And Mobility Allowance, N Shukla, A K. Choudhary, P Prakash, K J. Fernandes, M K. Tiwari

Faculty of Engineering and Information Sciences - Papers: Part A

The vehicle routing problem with stochastic demand (VRPSD) is a well known NP-hard problem. The uncharacteristic behaviour associated with the problem enhances the computational efforts required to obtain a feasible and near-optimal solution. This paper proposes an algorithm portfolio methodology based on evolutionary algorithms, which takes into account the stochastic nature of customer demand to solve this computationally complex problem. These problems are well known to have computationally complex objective functions, which make their solutions hard to find, particularly when problem instances of large dimensions are considered. Of particular importance in such situations is the timeliness of the solution. For ...


Bunker Consumption Optimization Methods In Shipping: A Critical Review And Extensions, Shuaian Wang, Qiang Meng, Zhiyuan Liu Jan 2013

Bunker Consumption Optimization Methods In Shipping: A Critical Review And Extensions, Shuaian Wang, Qiang Meng, Zhiyuan Liu

Faculty of Engineering and Information Sciences - Papers: Part A

It is crucial nowadays for shipping companies to reduce bunker consumption while maintaining a certain level of shlpping service in view of the high bunker price and concerned shipping emissions. After introducing the three bunker consumption optimization contexts: minimization of total operating cost. minimization of emission and collaborative mechanisms between port operators and shipping companies, this paper presents a aiticaJ and timely literature review on mathematical solution methods for bunker consumption optimization problems. Several navel bunker consumption optimization methods are subsequently proposed. The applicability, optimality, and efficiency of the existing and newly proposed methods are al5o analyzed. This paper provides ...


Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou Jan 2013

Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou

Faculty of Engineering and Information Sciences - Papers: Part A

Linkable ring signatures have found many attractive applications. One of the recent important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately, the existing LTRS schemes are only secure in the random oracle model (ROM). In this paper, we make the following contributions. First, we construct the first LTRS scheme that is secure without requiring the ROM. Further, we enhance the security of a threshold ring signature (for both linkable or non-linkable) by providing a stronger definition of anonymity. This strengthened notion makes threshold ring signature schemes more suitable in real life. Finally, we provide efficient schemes that outperform ...


A Decentralized Service Discovery Approach On Peer-To-Peer Network, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin Jan 2013

A Decentralized Service Discovery Approach On Peer-To-Peer Network, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin

Faculty of Engineering and Information Sciences - Papers: Part A

Service-Oriented Computing (SOC) is emerging as a paradigm for developing distributed applications. A critical issue of utilizing SOC is to have a scalable, reliable, and robust service discovery mechanism. However, traditional service discovery methods using centralized registries can easily suffer from problems such as performance bottleneck and vulnerability to failures in large scalable service networks, thus functioning abnormally. To address these problems, this paper proposes a peer-to-peer-based decentralized service discovery approach named Chord4S. Chord4S utilizes the data distribution and lookup capabilities of the popular Chord to distribute and discover services in a decentralized manner. Data availability is further improved by ...


Scalable Fragile Watermarking For Image Authentication, Angela Piper, Reihaneh Safavi-Naini Jan 2013

Scalable Fragile Watermarking For Image Authentication, Angela Piper, Reihaneh Safavi-Naini

Faculty of Engineering and Information Sciences - Papers: Part A

Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the image. Scalable compression allows a single compressed image to produce a variety of reduced resolution or reduced quality images, termed subimages, to suit the different display or bandwidth requirements of each user. However, highly scaled subimages remove a substantial fraction of the data in ...


Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au Jan 2013

Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au

Faculty of Engineering and Information Sciences - Papers: Part A

The advent of cloud computing has dramatically changed the IT scene, as it offers cost savings and improvements to major operations. Nevertheless, the major obstacle relies on the effort on how to secure sensitive data files that are outsourced to the cloud environment. To ensure confidentiality, the sensitive data are usually encrypted prior to being outsourced. Nevertheless, effective data utilization remains a challenging task and there is a clear need for a secure and efficient searching mechanism over the encrypted data in the cloud, to increase the us-ability of the secure cloud environment. Unfortunately, existing work in the area of ...


Self-Adaptation-Based Dynamic Coalition Formation In A Distributed Agent Network: A Mechanism And A Brief Survey, Dayong Ye, Minjie Zhang, Danny Sutanto Jan 2013

Self-Adaptation-Based Dynamic Coalition Formation In A Distributed Agent Network: A Mechanism And A Brief Survey, Dayong Ye, Minjie Zhang, Danny Sutanto

Faculty of Engineering and Information Sciences - Papers: Part A

In some real systems, e.g., distributed sensor networks, individual agents often need to form coalitions to accomplish complex tasks. Due to communication and computation constraints, it is infeasible for agents to directly interact with all other agents to form coalitions. Most previous coalition formation studies, however, overlooked this aspect. Those studies did not provide an explicitly modeled agent network or assumed that agents were in a fully connected network, where an agent can directly communicate with all other agents. Thus, to alleviate this problem, it is necessary to provide a neighborhood network structure, within which agents can directly interact ...


Strong Amicable Orthogonal Designs And Amicable Hadamard Matrices, Jennifer Seberry Jan 2013

Strong Amicable Orthogonal Designs And Amicable Hadamard Matrices, Jennifer Seberry

Faculty of Engineering and Information Sciences - Papers: Part A

Amicable orthogonal designs have renewed interest because of their use in mobile communications. We show the existence of strong amicable orthogonal designs, AOD(n: 1, n - 1; 1, n - 1), for n = pr + 1, p ≡ 3 (mod 4) a prime and for n = 2r, n a non-negative integer in a form more suitable for communications. Unfortunately the existence of amicable Hadamard matrices is not enough to demonstrate the existence of strong amicable orthogonal designs.


Approximation Algorithms For Interference Aware Broadcast In Wireless Networks, Dianbo Zhao, Kwan-Wu Chin Jan 2013

Approximation Algorithms For Interference Aware Broadcast In Wireless Networks, Dianbo Zhao, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

Broadcast is a fundamental operation in wireless networks and is well supported by the wireless channel. However, the interference resulting from a node's transmission pose a key challenge to the design of any broadcast algorithms/protocols. In particular, it is well known that a node's interference range is much larger than its transmission range and thus limits the number of transmitting and receiving nodes, which inevitably prolong broadcast. To this end, a number of past studies have designed broadcast algorithms that account for this interference range with the goal of deriving a broadcast schedule that minimizes latency. However ...


Energy-Aware Two Link-Disjoint Paths Routing, Gongqi Lin, Sieteng Soh, Mihai Lazarescu, Kwan-Wu Chin Jan 2013

Energy-Aware Two Link-Disjoint Paths Routing, Gongqi Lin, Sieteng Soh, Mihai Lazarescu, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

Network robustness and throughput can be improved by routing each source-to-terminal (s, t) demand via two link-disjoint paths (TLDP). However, the use of TLDP incurs higher energy cost. Henceforth, we address the problem of minimizing the energy usage of networks that use TLDP. Specifically, our problem is to maximally switch off redundant network links while maintaining at least 0zT100% of (s, t) TLDP in the network, for a given T, and limiting the maximum link utilization (MLU) to no greater than a configured threshold. To address this problem, we present a fast heuristic, called TLDP by Shortest Path First (TLDP-SPF ...


Risk Management In Liner Ship Fleet Deployment: A Joint Chance Constrained Programming Model, Tingsong Wang, Qiang Meng, Shuaian Wang, Zhijia Tan Jan 2013

Risk Management In Liner Ship Fleet Deployment: A Joint Chance Constrained Programming Model, Tingsong Wang, Qiang Meng, Shuaian Wang, Zhijia Tan

Faculty of Engineering and Information Sciences - Papers: Part A

This paper provides a tangible methodology to deal with the liner ship fleet deployment problem aiming at minimizing the total cost while maintaining a service level under uncertain container demand. The problem is first formulated as a joint chance constrained programming model, and the sample average approximation method and mixed-integer programming are used to deal with it. Finally, a numerical example of a liner shipping network is carried out to verify the applicability of the proposed model and solution algorithm. It is found that the service level has significant effect on the total cost.


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang Jan 2013

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang

Faculty of Engineering and Information Sciences - Papers: Part A

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then ...