Identity-based roaming protocol with anonymity for heterogeneous wireless networks
beetroot birkenstock The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original on