A Secure Authentication Scheme with Anonymity for Wireless Communications

被引:149
|
作者
Wu, Chia-Chun [1 ]
Lee, Wei-Bin [1 ]
Tsaur, Woei-Jiunn [2 ]
机构
[1] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[2] Da Yeh Univ, Dept Informat Management, Changhua, Taiwan
关键词
User authentication; wireless communications;
D O I
10.1109/LCOMM.2008.080283
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, a new authentication scheme with anonymity for wireless communications has been proposed, and then some security problems have been demonstrated. In this paper, we will discuss a few problems found in the enhanced scheme and then propose how to overcome them, regarding the properties of anonymity and backward secrecy.
引用
收藏
页码:722 / 723
页数:2
相关论文
共 50 条
  • [41] A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks
    Vanga Odelu
    Soumya Banerjee
    Ashok Kumar Das
    Samiran Chattopadhyay
    Saru Kumari
    Xiong Li
    Adrijit Goswami
    [J]. Wireless Personal Communications, 2017, 96 : 2351 - 2387
  • [42] An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
    Pan, Tian-Yang
    Chen, Li-Quan
    Zhang, Yuan-Fang
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 632 - 635
  • [43] An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
    Rui Chen
    Dezhong Peng
    [J]. Wireless Personal Communications, 2017, 97 : 2665 - 2682
  • [44] An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
    Chen, Rui
    Peng, Dezhong
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2665 - 2682
  • [45] Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
    Yu, SungJin
    Lee, JoonYoung
    Lee, KyungKeun
    Park, KiSung
    Park, YoungHo
    [J]. SENSORS, 2018, 18 (10)
  • [46] A secure and efficient authentication protocol for anonymous channel in wireless communications
    Yang, CC
    Tang, YL
    Wang, RC
    Yang, HW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1431 - 1439
  • [47] Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    Wang, Chun-Cheng
    [J]. 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 202 - 209
  • [48] A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems
    Mir, Omid
    van der Weide, Theo
    Lee, Cheng-Chi
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (09)
  • [49] Security flaws and improvement of an ID-based wireless authentication scheme with anonymity
    Jiang, Qi
    Li, Guang-Song
    Ma, Jian-Feng
    [J]. Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 209 - 216
  • [50] SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments
    Lwamo, Nassoro M. R.
    Zhu, Liehuang
    Xu, Chang
    Sharif, Kashif
    Liu, Ximeng
    Zhang, Chuan
    [J]. INFORMATION SCIENCES, 2019, 477 : 369 - 385