Cryptanalysis of the User Authentication Scheme with Anonymity

被引:0
|
作者
Jeon, Woongryul [1 ]
Kim, Jeeyeon [1 ]
Nam, Junghyun [2 ]
Lee, Youngsook [3 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
[2] Konkuk Univ, Dept Comp Engn, Seoul, South Korea
[3] Howon Univ, Dept Cyber Investigat Police, Gunsan, South Korea
来源
基金
新加坡国家研究基金会;
关键词
wireless communication; anonymity; user authentication; security; WIRELESS COMMUNICATIONS; SMART CARDS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, wireless communications using mobile device are growing rapidly. The most advantage of wireless communication is that user can transfer various information to anywhere at anytime using mobile device. However, it is clear that security of the wireless communications is more complex than wired owing to the openness of the wireless network. Thus, authentication has become the most important issue in the wireless communication. Furthermore, owing to the fact that location information shows user's life style, user anonymity becomes also significant issue. Recently, in 2011, Kang et al. pointed out that Wu et al.'s scheme has some security vulnerabilities and proposed an improved scheme. However, in this paper, we discuss that Kang et al.'s scheme is still vulnerable to active adversary.
引用
收藏
页码:285 / +
页数:3
相关论文
共 50 条
  • [1] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [2] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [3] Cryptanalysis of a Sensor Smart Card Based Password Authentication Scheme with User Anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. SENSOR LETTERS, 2013, 11 (11) : 2149 - 2151
  • [4] Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care
    Lili Xu
    Fan Wu
    [J]. Journal of Medical Systems, 2015, 39
  • [5] Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care
    Xu, Lili
    Wu, Fan
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (02)
  • [6] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [7] Cryptanalysis of a remote user authentication scheme
    Wang, Bangju
    Zhang, Huanguo
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1699 - 1701
  • [8] Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity
    Kim, Seil
    Chun, Ji Young
    Lee, Dong Hoon
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2235 - 2239
  • [9] Cryptanalysis and improvement of a remote user authentication scheme
    Ou Qingyu
    Huang Kai
    Li Guang
    [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
  • [10] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248