Cryptanalysis of the User Authentication Scheme with Anonymity

被引:0
|
作者
Jeon, Woongryul [1 ]
Kim, Jeeyeon [1 ]
Nam, Junghyun [2 ]
Lee, Youngsook [3 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
[2] Konkuk Univ, Dept Comp Engn, Seoul, South Korea
[3] Howon Univ, Dept Cyber Investigat Police, Gunsan, South Korea
来源
基金
新加坡国家研究基金会;
关键词
wireless communication; anonymity; user authentication; security; WIRELESS COMMUNICATIONS; SMART CARDS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, wireless communications using mobile device are growing rapidly. The most advantage of wireless communication is that user can transfer various information to anywhere at anytime using mobile device. However, it is clear that security of the wireless communications is more complex than wired owing to the openness of the wireless network. Thus, authentication has become the most important issue in the wireless communication. Furthermore, owing to the fact that location information shows user's life style, user anonymity becomes also significant issue. Recently, in 2011, Kang et al. pointed out that Wu et al.'s scheme has some security vulnerabilities and proposed an improved scheme. However, in this paper, we discuss that Kang et al.'s scheme is still vulnerable to active adversary.
引用
收藏
页码:285 / +
页数:3
相关论文
共 50 条
  • [31] Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme
    Hwang, Min-Shiang
    Yang, Hung-Wei
    Yang, Cheng-Ying
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING, 2020, 719
  • [32] Cryptanalysis of a user friendly remote authentication scheme with smart cards
    Yang, CC
    Wang, RC
    [J]. COMPUTERS & SECURITY, 2004, 23 (05) : 425 - 427
  • [33] Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem
    Kang, Dongwoo
    Lee, Hakjun
    Won, Dongho
    Lee, Youngsook
    [J]. Proceedings of the 2020 14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020, 2020,
  • [34] Cryptanalysis and Improvement of A Mutual User Authentication Scheme for the Internet of Things
    Limbasiya, Trupil
    Karati, Arijit
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 168 - 173
  • [35] Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem
    Kang, Dongwoo
    Lee, Hakjun
    Won, Dongho
    Lee, Youngsook
    [J]. PROCEEDINGS OF THE 2020 14TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM), 2020,
  • [36] An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity
    Kim, Mijin
    Kim, Seungjoo
    Won, Dongho
    [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 244 - 253
  • [37] A Secure Mobility Network Authentication Scheme Ensuring User Anonymity
    Chang, Ya-Fen
    Tai, Wei-Liang
    Hsu, Min-How
    [J]. SYMMETRY-BASEL, 2017, 9 (12):
  • [38] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards'
    Khan, Muhammad Khurram
    [J]. ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105
  • [39] An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
    Khan, Muhammad Khurram
    Kumari, Saru
    [J]. BIOMED RESEARCH INTERNATIONAL, 2013, 2013
  • [40] Robust smart-cards-based user authentication scheme with user anonymity
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 236 - 248