Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications

被引:1
|
作者
Xiong, Hu [1 ,2 ]
Wang, Xiaofeng [1 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
wireless communication; user authentication; anonymity; cryptanalysis;
D O I
10.1587/transfun.E95.A.256
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Kang et al. discussed some security flaws of Wu et al's and Wei et al.'s authentication schemes that guarantee user anonymity in wireless communications and showed how to overcome the problems regarding anonymity and the forged login messages. However, we will show that Kang et al.'s improved scheme still did not provide user anonymity as they claimed.
引用
收藏
页码:256 / 258
页数:3
相关论文
共 50 条
  • [31] An Improved Multifactor User Authentication Scheme for Wireless Sensor Networks
    Gaurav Tyagi
    Rahul Kumar
    [J]. Wireless Personal Communications, 2022, 123 : 1311 - 1343
  • [32] An improved dynamic user authentication scheme for wireless sensor networks
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 986 - 990
  • [33] An Improved Multifactor User Authentication Scheme for Wireless Sensor Networks
    Tyagi, Gaurav
    Kumar, Rahul
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (02) : 1311 - 1343
  • [34] Smart Card Based User Authentication Scheme with Anonymity
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 220 - 233
  • [35] User authentication scheme preserving anonymity for ubiquitous devices
    Djellali, Benchaa
    Belarbi, Kheira
    Chouarfia, Abdallah
    Lorenz, Pascal
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3131 - 3141
  • [36] Robust smart-cards-based user authentication scheme with user anonymity
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 236 - 248
  • [37] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [38] An Efficient Remote User Authentication Scheme with Strong Anonymity
    Liu, Yanfei
    Zhao, Ziming
    Li, Hui
    Luo, Qun
    Yang, Yixian
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 180 - 185
  • [39] An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    Shin, Soobok
    Yeh, Hongjin
    Kim, Kangseok
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 674 - 683
  • [40] Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
    Kang, Dongwoo
    Jung, Jaewook
    Mun, Jongho
    Lee, Donghoon
    Choi, Younsung
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1462 - 1476