Improvement of user authentication protocol with anonymity for wireless communications

被引:0
|
作者
Hu, Bin [1 ]
Xie, Qi [1 ]
Bao, Mengjie [1 ]
Dong, Na [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou 310036, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Key agreement; mobile networks; security; smart card; ROAMING SERVICE; SCHEME; SECURE; EFFICIENT;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
To design a mobile user authentication protocol with anonymity for the global mobile network is a challenge, since wireless network is more vulnerable to attacks and mobile terminals' computational power is limited. In 2012, Li & Lee proposed a user authentication and privacy preserving scheme with smart card for wireless communications. In this paper, we improve the adversary model of this type of authentication scheme, and then demonstrate that Li & Lee's scheme is vulnerable to off-line password guessing attack. To remedy this security weakness, an improved scheme is proposed, which is more efficient than Li & Lee's scheme.
引用
收藏
页码:155 / 169
页数:15
相关论文
共 50 条
  • [1] Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Kang, Miyoung
    Rhee, Hyun Sook
    Choi, Jin-Young
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 860 - 864
  • [2] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476
  • [3] A user friendly authentication scheme with anonymity for wireless communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Ha, Keum-Sook
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (03) : 356 - 364
  • [4] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [5] Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Xiong, Hu
    Wang, Xiaofeng
    Li, Fagen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 256 - 258
  • [6] A novel wireless authentication protocol preserving user anonymity and untraceability
    Wei, Yongzhuang
    Qiu, Hongbing
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 575 - +
  • [7] Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    Park, CS
    [J]. COMPUTER NETWORKS, 2004, 44 (02) : 267 - 273
  • [8] An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
    Pan, Tian-Yang
    Chen, Li-Quan
    Zhang, Yuan-Fang
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 632 - 635
  • [9] A Novel Authentication Scheme with Anonymity for Wireless Communications
    Pang, Liaojun
    Li, Huixian
    Zhou, Xia
    Wang, Yumin
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3021 - 3026
  • [10] A Secure Authentication Scheme with Anonymity for Wireless Communications
    Wu, Chia-Chun
    Lee, Wei-Bin
    Tsaur, Woei-Jiunn
    [J]. IEEE COMMUNICATIONS LETTERS, 2008, 12 (10) : 722 - 723