Fig. 1.
I. INTRODUCTION
UE to the deployment of wireless communication technologies and the popularity of mobile devices (such as
laptop, intelligent mobile phone, and tablet PC), we can access
the Internet services during mobility. This brings much convenience to our daily life as we can enjoy many kinds of network
services anywhere and anytime. With users increasing demand
of high services quality, a huge amount of data should be processed in time by his/her mobile device. However, the mobile
devices resources (such as storage, computation, and communication capabilities) are limited and they cannot satisfy users
requirements [1][3]. This weakness has become a performance
bottleneck of various applications based on mobile devices.
In the past several years, the cloud computing developed
rapidly as one of the powerful network technologies. Through
the resource visualization technology, the cloud computing is
able to provide convenient and cheap services to users in a
pay-as-you-go mode [4], [5]. For example, we can get some
cloud storage services freely from many famous cloud service providers (CSPs) such as Baidu and Google. A new
digital ecosystem called the mobile cloud computing (MCC)
emerged recently, where the mobile computing is integrated with
cloud computing platforms. With this integration, the resourceconstrained problems of mobile devices could be addressed
successfully. With the increase of MCC services types, the distributed MCC is also employed in practical applications, where
many kinds of CSPs are able to provide different types of cloud
services to users [6], [7]. A typical architecture of MCC services is illustrated in Fig. 1.
1937-9234 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
2
Because all the messages are transmitted by using the wireless technology in MCC services environment, the adversary
could control the communication channel easily, i.e., his/her is
able to intercept, delay, and modify transmitted message. Then,
the MCC services environment is more vulnerable to various
types of attacks than traditional cloud computing services environment. To ensure that only the legal user can access MCC
services and stop the adversary accessing MCC services, new
security mechanisms should be developed for the environment.
The privacy-aware authentication (PAA) scheme is very crucial for address security problem in MCC services environment
because it is able to identify the participants identities and protect their privacy. Many PAA schemes have been proposed in
the past several years. However, most of them are not suitable
for MCC services because they suffer serious security problem
or have unsatisfactory performance. Therefore, it is necessary
to designed new PAA schemes to ensure security and preserve
privacy in MCC services environment.
A. Related Work
To achieve mutual authentication (MA) in open networks,
Lamport [8] proposed the first authentication scheme for the
single server environment. However, Lamports scheme is not
able to resist the replay attack and the impersonation attack.
In order to improve security, several password-based authentication schemes are proposed [9][13]. Compared with Lamports scheme, those schemes have many advantages. However,
each server in those schemes has to maintain a verifier table to
achieve the MA. The adversary may impersonate the user or the
server when he/she steals verifier tables. Besides, those above
schemes suffer from the denial of service attack if the adversary
modifies the verifier table maliciously. To remove the serious
weaknesses, it is necessary to design authentication schemes
without any verifier table.
Hwang and Li [14] designed the first authentication scheme
by using both the password and the smart card. Compared with
previous authentication schemes [9][11], [15], [16], no verifier table is needed in their scheme. Therefore, Hwang and Lis
scheme has better security. To get better performance, Sun [17]
proposed an efficient scheme based on Hwang and Lis work.
However, neither Hwang and Lis scheme [14] nor Suns scheme
[17] achieve the MA. To achieve better security and performance, many authentication schemes [18][25] using both the
password and the smart card were proposed in the last decades.
However, those schemes cannot be directly used in MCC services environment because many CSP exist in MCC services
environment and the user has to register in every CSP repeatedly. The user not only has to put extra efforts in remembering
many passwords and identities, but also wastes a lot of time to
execute repeated registration.
To solve the two weaknesses, the concept of the authentication scheme for multiserver environment was introduced recently, where the user just needs to register in the registration
center. Li et al. [26] proposed the first authentication scheme
for multiserver environment. However, Lin et al. [27] pointed
out that the performance of their scheme is not acceptable because complicated neural networks are used to implement the
MA. To improve performance, Lin et al. [27] designed a new
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
HE et al.: EFFICIENT PAA SCHEME FOR MCC SERVICES
Fig. 2.
Network model.
C. Security Requirements
Due to openness of the wireless network, the adversary can
control the communication channels between the CSP and the
user. Therefore, the PAA scheme for MCC services suffers from
many types of attacks. To guarantee security, a PAA scheme for
MCC services should meet the below specified requirements
[37], [39][41].
Mutual authentication: To ensure only legal users could access MCC services, a PAA scheme should be able to provide
MA between Ui and CSPj to ensure their legality.
User anonymity: To preserver privacy, a PAA scheme for
MCC services should be able to provide user anonymity, i.e., the
adversaries including malicious users and CSPs cannot extract
the users real identity through intercepted messages.
Untraceability: The user anonymity is not robust enough for
protecting the users privacy because the adversary may trace
the users action through tracking some constant value sent by
the user. To achieve satisfactory security level, a PAA scheme
for MCC services should be able to provide untraceability.
Key establishment: To ensure secure communication after
MA, a PAA scheme for MCC services should be able to provide
key establishment, i.e., a session key should be produced in the
process of MA to encrypt messages in future communication.
Known session key security: To ensure secure communication
in current session, the adversary should not be able to extract
the session key generated in the current session even if he/she
could get some session keys produced in previous sessions.
Perfect forward secrecy: To guarantee the confidentiality of
messages transmitted in the system, a PAA scheme for MCC
services should be able to provide perfect forward secrecy, i.e.,
the adversary cannot get the session key in a previous session
even if he/she can both private keys of the user and the CSP.
No verifier table: To avoid management problem of verifier
table and some attacks related to verifier table, a PAA scheme
for MCC services should be able to provide no verifier table,
i.e., no verifier table is needed to achieve MA.
No clock synchronization: To avoid complicated clock synchronization problem, a PAA scheme for MCC services should
be able to provide no clock synchronization.
Resistance of known attacks: To withstand various attacks
existing in MCC services environment, a PAA scheme for MCC
services should be able to resistance of known attacks.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
4
Fig. 3.
1
SU ,
b + h3 (IDU i ||A||IDS P j ||W ||Kij ) i
and Ci = Kij (IDU i ||i ||W ). Ui sends {K2 , Ci }
to CSPj .
d) CSPj computes the session key Kji = h2 (e(K2 ,
SCSP j )a ) and (IDi ||i ||W ) = Kji Ci . CSPj
checks whether the equation e(i , W +
holds,
h3 (IDU i ||A||IDCSP j , , Kji ) QU i ) = g
where QU i = Ppub + h1 (IDU i ) P . If not, SPj
terminates the service request; otherwise, CSPj
computes Di = h4 (Kji ||A||IDU i ||IDS P j ) and
sends {Di } to Ui .
e) Ui checks whether Di and h4 (Kij ||A||IDU i ||
IDCSP j ) are equal. If not, Ui terminates the service request; otherwise, Ui confirm that CSPj is a
legal CSP.
P,
i =
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
HE et al.: EFFICIENT PAA SCHEME FOR MCC SERVICES
(1)
= H2 (e(K2 , P ) )
= Kji
and
Di = h4 (Kji , A, IDU i , IDCSP j )
= h4 (Kij , A, IDU i , IDCSP j ).
(2)
Fig. 4.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
6
1
P
s + h1 (IDCSP j )
1
= e b (s P + h1 (IDCSP j ) P,
P
s + h1 (IDCSP j )
1
= e b (s + h1 (IDCSP j )) P,
P
s + h1 (IDCSP j )
= e(P, P )
b(s+h 1 (IDC S P j )) s + h
1
1 ( IDC S P j )
= gb
=B
(3)
(r + U i ) s + h
1
1 ( IDU i )
(s+h 1 (IDU i ))
g U i
= g r + U i g U i
= gr
=R
(4)
and
Kji = h2 (A, B, B a )
a
= h2 (A, B, (g b ) )
= h2 (A, B, (g a )b )
= h2 (A, B, Ab )
= Kij
(5)
|2 Pr[EGC ] 1|.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
HE et al.: EFFICIENT PAA SCHEME FOR MCC SERVICES
B. Security Theory
We prove that our proposed PAA scheme for MCC services
is MA-secure and AKE-secure if the k-CAA problem, the kmBIDH problem, and the CDH problem are hard in this section.
Lemma 1: There is no adversary who can forge a legal login
message if the k-CAA problem is difficult.
Proof: Assume that A can outputs a legal login message
{K2 , Ci } with a nonnegligible probability with the probability
at the end of the game. According to the forking lemma [47],
A can output another legal login message {K2 , C i } with the
probability 2 by selecting a different random oracle h3 .
Due to the legality of the two messages, we get the following
equations:
R = e(U i , Ppub + h1 (IDU i ) P ) g
U i
(7)
According to the above two equations, we get the following
equations:
e(U i U i , Ppub + h1 (IDU i ) P )
=
/g U i
R/
g Ui
= g U i U i
Pr[EF RM |EF LM ]
Pr[Di = h4 (IDCSP j ||IDU i ||A||Kji ||K2 ||B)|
K2 G1 , B G2 ] +
(6)
and
R = e(U i , Ppub + h1 (IDU i ) P ) g U i .
(8)
and
1
e(( U i U i ) (U i U i ), Ppub + h1 (IDU i ) P ) = g.
(9)
1
P,
For given P, s P G1 , 1 , 2 , . . . , k Zq , s+
1
1
1
P,
.
.
.
,
P
,
and
h
(ID
)
=
,
A
can
outputs
1
U
i
s+ 2
s+ k
( U i U i )1 (U i U i ) as the answer of the k-CAA problem, i.e., C can solve the k-CAA problem with a nonnegligible
advantage. Due to the difficulty of the k-CAA problem, we know
that there is no adversary against our proposed PAA scheme that
can forge a legal login message.
Lemma 2: There is no adversary who can forge a legal response message if the k-mBIDH problem is difficult.
Proof: Let EF LM and EF RM denote the events of forging a legal login message and a legal response message, respectively. According to the proof of Lemma 1, we assume that
even EF LM does not happen. Suppose that an adversary A
against our proposed PAA scheme forges a response message
with a nonnegligible advantage , i.e., A can forge a response
message {Di } after receiving the login message {K2 , Ci } and
{Di } can pass Ui s verification, where Kij = h2 (A||B||Ab ),
K2 = b (Ppub + h1 (IDCSP j ) P ), B = g b , = h3 (IDU i ||
IDCSP j ||A||Kij ||K2 ||B), i = (b )SU i , Ci = h4 (B) (I
q3
qU
+ U2 .
q
q
(10)
(11)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
8
and
Pr[EGC ETest(U ) ] + Pr[EGC ETest(CSP) EF LM ]
= Pr[EGC ETest(CSP) EF LM ]
Pr[EF LM ].
(12)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
HE et al.: EFFICIENT PAA SCHEME FOR MCC SERVICES
TABLE I
SECURITY COMPARISONS OF TWO PAA SCHEMES
TABLE II
RUNNING TIME OF RELATED OPERATIONS (MILLISECOND)
Tsai and Los PAA Scheme [41] Our Proposed PAA Scheme
Mutual authentication
User anonymity
Untraceability
Key establishment
Known session key security
Perfect forward secrecy
No verifier table
No clock synchronization
Resistance of known attacks
No
No
Yes
Yes
Yes
Yes
Yes
Yes
No
T mtp
T bp
T sm
T pa
T exp
T mul
Th
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
The User
The Server
33.582
32.713
13.405
0.081
2.249
0.008
0.056
5.493
5.427
2.165
0.013
0.339
0.001
0.007
TABLE III
COMPUTATION COST COMPARISONS OF TWO PAA SCHEMES
Ui
CSP j
T mtp + 4T sm + T exp + 4T h
89.675 ms
2T bp + 2T sm + 2T pa +
2T exp + 4T h 16.096 ms
T mtp + 3T sm + 2T exp +
4T h 78.519 ms
2T bp + 2 T pa + 2 T exp +
T mul + 5T h 11.774 ms
A. Computation Cost
In this section, we analyze the computation cost of our proposed PAA scheme and compare it with that of Tsai and Los
PAA scheme [41]. Some notations of the running time are listed
as follows.
1) Tbp : The time of executing a bilinear paring operation.
2) Tsm : The time of executing a scalar multiplication operation in G1 .
3) Tmtp : The time of executing a map-to-point hash function
in G1 .
4) Tpa : The time of executing a point addition operation in
G1 .
5) Texp : The time of executing an exponentiation operation
in G2 .
6) Tmul : The time of executing a multiplication operation in
G2 .
7) Th : The time of executing a general hash operation.
To achieve convincing comparisons of computation cost, we
have implemented all operations involved in our proposed PAA
scheme and Tsai and Los PAA scheme [41] using the Multiprecision Integer and Rational Arithmetic C/c++ Library [49]
on a real platform, which is consisting of a mobile device (Samsung Galaxy S5 with a Quad-core 2.45 GHz processor, 2 Gb
memory, and the Google Android 4.4.2 operating system) and a
personal computer (Dell with an I5-4460S 2.90 GHz processor,
4 Gb memory, and the Window 8 operating system) [50]. In
our analysis, we will use the mobile device and the personal
computer to simulate the mobile user and the CSP, respectively.
The running time of related operations is listed in Table II [50].
According to the above experiment results, we compare the
computation cost of our proposed PAA scheme and Tsai and
Los PAA scheme [41]. Through counting the number of different operations, we get the time of executing both PAA schemes
and list them in Table III.
Based on Table III, we confirm that the running time of the
user in Tsai and Los PAA scheme and our proposed PAA
scheme is 89.675 and 78.519 ms separately. We also know that
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
10
TABLE IV
COMMUNICATION COST COMPARISONS OF TWO PAA SCHEMES
[3]
Tsai and Los PAA Scheme [41]
4320 bits
3296 bits
[4]
[5]
the running time of the CSP in Tsai and Los PAA scheme and
our proposed PAA scheme is 16.096 and 11.774 ms separately.
Therefore, we conclude that our proposed PAA scheme has less
computation cost than Tsai and Los PAA scheme.
[6]
[7]
B. Communication Cost
Because p and q are a 512-bits prime number and a 160-bits
prime number separately, the length of the element in G1 and G2
is 1024-bits and the output length of h4 is 160-bits. We assume
that the length of both the login request and the users identity
is 32-bits. We get the communication cost of our proposed PAA
scheme and Tsai and Los PAA scheme in Table IV.
The user in Tsai and Los PAA scheme sends the login request
and {K2 , Ci } to the CSP, where Ci = Kij (IDU i , i , W ) and
K2 , i , W G1 . The CSP sends A and Di to the user, where
A G2 and Di is an output of h4 . Therefore, the communication cost of Tsai and Los PAA scheme is 32 + 32 + 1024 + 1024
+ 1024 + 1024 + 160 = 4320-bits.
The user in our proposed PAA scheme sends the login request
and {K2 , Ci } to the CSP, where Ci = Kij (IDU i , i ) and
K2 , i G1 . The CSP sends A and Di to the user, where A
G2 and Di is an output of h4 . Therefore, the communication
cost of our proposed PAA scheme is 32 + 32 + 1024 + 1024 +
1024 + 160 = 3296-bits.
Therefore, we can conclude that our proposed PAA scheme
has less communication cost than Tsai and Los PAA scheme.
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
VII. CONCLUSION
Due to highly dynamic nature of mobile devices in the MCC
environment, the traditional authentication schemes are not suitable for various services in this environment. To solve the security problem in MCC services, Tsai and Lo proposed an efficient
PAA scheme for the MCC services by using the bilinear pairing. This paper points out that Tsai and Los PAA scheme is
vulnerable to a serious attack and is not able to support user
anonymity. To solve such serious weaknesses, the paper proposes a new PAA scheme for MCC services. Security analysis
shows that our proposed PAA scheme can solve the security
problem existing in Tsai and Los PAA scheme. Besides, the
performance analysis shows that our proposed PAA scheme has
better performance than their PAA scheme.
In the future, we will explore more attributes of the proposed
scheme, which can be applied for secure service access in MCC
environment.
REFERENCES
[1] M. Satyanarayanan, Fundamental challenges in mobile computing, in
Proc. 15th Annu. ACM Symp. Princ. Distrib. Comput., 1996, pp. 17.
[2] Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, Achieving efficient cloud
search services: Multi-keyword ranked search over encrypted cloud data
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
HE et al.: EFFICIENT PAA SCHEME FOR MCC SERVICES
[27] I.-C. Lin, M.-S. Hwang, and L.-H. Li, A new remote user authentication scheme for multi-server architecture, Future Gener. Comput. Syst.,
vol. 19, no. 1, pp. 1322, 2003.
[28] X. Cao and S. Zhong, Breaking a remote user authentication scheme for
multi-server architecture, IEEE Commun. Lett., vol. 10, no. 8, pp. 580
581, Aug. 2006.
[29] C.-C. Lee, T.-H. Lin, and R.-X. Chang, A secure dynamic ID based
remote user authentication scheme for multi-server environment using
smart cards, Expert Syst. Appl., vol. 38, no. 11, pp. 1386313870, 2011.
[30] S. K. Sood, A. K. Sarje, and K. Singh, A secure dynamic identity based
authentication protocol for multi-server architecture, J. Netw. Comput.
Appl., vol. 34, no. 2, pp. 609618, 2011.
[31] X. Li, Y. Xiong, J. Ma, and W. Wang, An efficient and security dynamic identity based authentication protocol for multi-server architecture
using smart cards, J. Netw. Comput. Appl., vol. 35, no. 2, pp. 763769,
2012.
[32] W.-J. Tsaur, J.-H. Li, and W.-B. Lee, An efficient and secure multi-server
authentication scheme with key agreement, J. Syst. Softw., vol. 85, no. 4,
pp. 876882, 2012.
[33] K. Xue, P. Hong, and C. Ma, A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification
tables for multi-server architecture, J. Comput. Syst. Sci., vol. 80, no. 1,
pp. 195206, 2014.
[34] D. Mishra, A. K. Das, and S. Mukhopadhyay, A secure user anonymitypreserving biometric-based multi-server authenticated key agreement
scheme using smart cards, Expert Syst. Appl., vol. 41, no. 18, pp. 8129
8143, 2014.
[35] X. Li, J. Niu, S. Kumari, J. Liao, and W. Liang, An enhancement of a
smart card authentication scheme for multi-server architecture, Wireless
Pers. Commun., vol. 80, no. 1, pp. 175192, 2015.
[36] S. Shunmuganathan, R. D. Saravanan, and Y. Palanichamy, Secure and
efficient smart-card-based remote user authentication scheme for multiserver environment, Can. J. Electr. Comput. Eng., vol. 38, no. 1, pp. 20
30, 2015.
[37] E.-J. Yoon and K.-Y. Yoo, Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve
cryptosystem, J. Supercomput., vol. 63, no. 1, pp. 235255, 2013.
[38] H. Kim, W. Jeon, K. Lee, Y. Lee, and D. Won, Cryptanalysis and improvement of a biometrics-based multi-server authentication with key
agreement scheme, in Proc. Int. Conf. Comput. Sci. Appl., 2012, pp. 391
406.
[39] D. He and D. Wang, Robust biometrics-based authentication scheme for
multiserver environment, IEEE Syst. J., vol. 9, no. 3, pp. 816823, Sep.
2015.
[40] V. Odelu, A. K. Das, and A. Goswami, A secure biometrics-based multiserver authentication protocol using smart cards, IEEE Trans. Inf. Forens.
Security, vol. 10, no. 9, pp. 19531966, Sep. 2015.
[41] J.-L. Tsai and N.-W. Lo, A privacy-aware authentication scheme for
distributed mobile cloud computing services, IEEE Syst. J., vol. 9, no. 3,
pp. 805815, Sep. 2015.
[42] S. Mitsunari, R. Sakai, and M. Kasahara, A new traitor tracing, IEICE
Trans. Fundam. Electron. Commun. Comput. Sci., vol. 85, no. 2, pp. 481
484, 2002.
[43] K. Y. Choi, J. Y. Hwang, D. H. Lee, and I. S. Seo, ID-based Authenticated Key Agreement for Low-Power Mobile Devices. Berlin, Germany:
Springer, 2005, pp. 494505.
[44] W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans.
Inf. Theory, vol. IT-22, no. 6, pp. 644654, Nov. 1976.
[45] M. Jakobsson and D. Pointcheval, Mutual authentication for low-power
mobile devices, in Proc. Int. Conf. Financ. Cryptogr., 2001, pp. 178195.
[46] T.-Y. Wu and Y.-M. Tseng, An efficient user authentication and key
exchange protocol for mobile clientserver environment, Comput. Netw.,
vol. 54, no. 9, pp. 15201530, 2010.
[47] D. Pointcheval and J. Stern, Security arguments for digital signatures and
blind signatures, J. Cryptol., vol. 13, no. 3, pp. 361396, 2000.
[48] F. Hess, N. P. Smart, and F. Vercauteren, The eta pairing revisited, IEEE
Trans. Inf. Theory, vol. 52, no. 10, pp. 45954602, Oct. 2006.
[49] Shamus Software Ltd., Miracl library, Available: http://www.shamus.ie/
index.php?page=home
[50] D. He, S. Zeadally, N. Kumar, and W. Wei, Efficient and anonymous
mobile user authentication protocol using self-certified public key cryptography for multi-server architectures, IEEE Trans. Inf. Forens. Security,
vol. 11, no. 9, pp. 20522064, Sep. 2016.
11
Debiao He received the Ph.D. degree in applied mathematics from the School of Mathematics and Statistics, Wuhan University, Wuhan, China, in 2009.
He is currently an Associate Professor with the
State Key Laboratory of Software Engineering, Computer School, Wuhan University. His main research
interests include cryptography and information security, in particular, cryptographic protocols.
Neeraj Kumar received the Ph.D. degree in computer science and engineering from Shri Mata
Vaishno Devi University, Katra, India.
He was a Postdoctoral Research Fellow with
Coventry University, Coventry, U.K. He is an Associate Professor with the Department of Computer
Science and Engineering, Thapar University, Patiala,
India. He has authored or co-authored more than 150
technical research papers in leading journals and conferences from IEEE, Elsevier, Springer, Wiley, etc.
Some of his research findings have been published in
top cited journals such as the IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, the IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, the
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, the IEEE
TRANSACTIONS ON CONSUMER ELECTRONICS, IEEE Network, the IEEE TRANSACTIONS ON COMMUNICATIONS, the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, the IEEE INTERNET OF THINGS JOURNAL, the IEEE SYSTEMS
JOURNAL, the Future Generation Computer Systems, the Journal of Network
and Computer Applications, and Computer Communications. He has guided
many research scholars leading to their Ph.d. and M.E./M.Tech. degrees. His
research has been supported by the TCS, CSIR, and UGC.
Muhammad Khurram Khan is currently a Full Professor with the Center of Excellence in Information
Assurance, King Saud University, Riyadh, Saudi Arabia. He has authored or co-authored more than 250
papers in international journals and conferences and
is an inventor of 10 U.S./PCT patents. He has edited 7
books and proceedings published by Springer-Verlag
and the IEEE. He is the Editor-in-Chief of Telecommunication Systems (Springer). His current research
interests include cybersecurity, biometrics, multimedia security, and digital authentication.
Dr. Khan is also on the Editorial Boards of several international journals.
Jian Shen received the B.E. degree from the Nanjing University of Information Science and Technology, Nanjing, China, in 2007 and the M.E. and
Ph.D. degrees in computer science from Chosun University, Gwangju, South Korea, in 2009 and 2012,
respectively.
Since late 2012, he has been a Professor with the
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing.
His research interests include information security,
network security, mobile computing and networking,
and ad hoc networks and systems.