A new authentication scheme with anonymity for wireless environments

被引:205
|
作者
Zhu, JM [1 ]
Ma, JF [1 ]
机构
[1] Xidian Univ, Sch Comp, Xian 710071, Peoples R China
关键词
anonymity; authentication; security; wireless network;
D O I
10.1109/TCE.2004.1277867
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless network, is susceptible to security attacks because its openness of transmission media. Wireless network security is somewhat more concentrated and complex than that of wired network. Authentication is the most essential procedure to ensure that the service is properly used. But its limited resource, such as weak power supplies and limited bandwidth, must be taken into account in the design of security schemes. In this paper, we present a new and efficient wireless authentication protocol providing user anonymity. Our scheme is based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. Finally, the performance of our scheme is analyzed(1).
引用
收藏
页码:231 / 235
页数:5
相关论文
共 50 条
  • [1] Security enhancement on a new authentication scheme with anonymity for wireless environments
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Liao, I-En
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (05) : 1683 - 1687
  • [2] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [3] Secure Authentication Scheme with Improved Anonymity for Wireless Environments
    Lee, JongHyup
    Kwon, Taekyoung
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (02) : 554 - 557
  • [4] An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments
    Jeon, Woongryul
    Kim, Jeeyeon
    Nam, Junghyun
    Lee, Youngsook
    Won, Dongho
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (07) : 2505 - 2508
  • [5] Security analysis of authentication scheme with anonymity for wireless environments
    Wei, Yongzhuang
    Qiu, Hongbing
    Hu, Yupu
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 535 - +
  • [6] A Novel Authentication Scheme with Anonymity for Wireless Communications
    Pang, Liaojun
    Li, Huixian
    Zhou, Xia
    Wang, Yumin
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3021 - 3026
  • [7] A Secure Authentication Scheme with Anonymity for Wireless Communications
    Wu, Chia-Chun
    Lee, Wei-Bin
    Tsaur, Woei-Jiunn
    [J]. IEEE COMMUNICATIONS LETTERS, 2008, 12 (10) : 722 - 723
  • [8] Security Flaws in Authentication Protocols with Anonymity for Wireless Environments
    Xu, Jing
    Feng, Dengguo
    [J]. ETRI JOURNAL, 2009, 31 (04) : 460 - 462
  • [9] ID-based wireless authentication scheme with anonymity
    Zhu, Hui
    Li, Hui
    Su, Wan-Li
    Wang, Yu-Min
    [J]. Tongxin Xuebao/Journal on Communication, 2009, 30 (04): : 130 - 136
  • [10] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476