Cryptanalysis of the User Authentication Scheme with Anonymity

被引:0
|
作者
Jeon, Woongryul [1 ]
Kim, Jeeyeon [1 ]
Nam, Junghyun [2 ]
Lee, Youngsook [3 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
[2] Konkuk Univ, Dept Comp Engn, Seoul, South Korea
[3] Howon Univ, Dept Cyber Investigat Police, Gunsan, South Korea
来源
基金
新加坡国家研究基金会;
关键词
wireless communication; anonymity; user authentication; security; WIRELESS COMMUNICATIONS; SMART CARDS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, wireless communications using mobile device are growing rapidly. The most advantage of wireless communication is that user can transfer various information to anywhere at anytime using mobile device. However, it is clear that security of the wireless communications is more complex than wired owing to the openness of the wireless network. Thus, authentication has become the most important issue in the wireless communication. Furthermore, owing to the fact that location information shows user's life style, user anonymity becomes also significant issue. Recently, in 2011, Kang et al. pointed out that Wu et al.'s scheme has some security vulnerabilities and proposed an improved scheme. However, in this paper, we discuss that Kang et al.'s scheme is still vulnerable to active adversary.
引用
收藏
页码:285 / +
页数:3
相关论文
共 50 条
  • [11] Improved remote user authentication scheme preserving user anonymity
    Hu, Lanlan
    Yang, Yixian
    Niu, Xinxin
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 323 - +
  • [12] A Remote User Authentication Scheme Preserving User Anonymity and Traceability
    Shao, Shuai
    Li, Hui
    Niu, Xinxi
    Yang, Yixian
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5255 - 5258
  • [13] Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Kang, Miyoung
    Rhee, Hyun Sook
    Choi, Jin-Young
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 860 - 864
  • [14] A bilateral remote user authentication scheme that preserves user anonymity
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) : 301 - 308
  • [15] Cryptanalysis of 'A novel user-participating authentication scheme'
    Choudhury, Amlan Jyoti
    Sain, Mangal
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 963 - 967
  • [16] Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard
    Kang, Dongwoo
    Jung, Jaewook
    Yang, Hyungkyu
    Choi, Younsung
    Won, Dongho
    [J]. ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 78 - 84
  • [17] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [18] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476
  • [19] Smart Card Based User Authentication Scheme with Anonymity
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 220 - 233
  • [20] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,