A user friendly authentication scheme with anonymity for wireless communications

被引:48
|
作者
Yoon, Eun-Jun [2 ]
Yoo, Kee-Young [3 ]
Ha, Keum-Sook [1 ]
机构
[1] Kumi Coll, Div Comp Informat & Elect, Gumi 730711, Gyungbook, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
[3] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
EFFICIENT;
D O I
10.1016/j.compeleceng.2011.03.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure user authentication is an important issue for wireless environment such as GSM, CDPD, and 3G and 4G wireless systems. Especially, anonymity of the mobile users should be guaranteed to protect the privacy of the mobile users. This paper proposes a user friendly authentication scheme with anonymity for wireless communications that not only can overcome the weaknesses of the previous related schemes, but also can provide efficiency and security to suitable for battery-powered mobile devices in wireless communication systems. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:356 / 364
页数:9
相关论文
共 50 条
  • [1] Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Kang, Miyoung
    Rhee, Hyun Sook
    Choi, Jin-Young
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 860 - 864
  • [2] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476
  • [3] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [4] Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Xiong, Hu
    Wang, Xiaofeng
    Li, Fagen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 256 - 258
  • [5] A Novel Authentication Scheme with Anonymity for Wireless Communications
    Pang, Liaojun
    Li, Huixian
    Zhou, Xia
    Wang, Yumin
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3021 - 3026
  • [6] A Secure Authentication Scheme with Anonymity for Wireless Communications
    Wu, Chia-Chun
    Lee, Wei-Bin
    Tsaur, Woei-Jiunn
    [J]. IEEE COMMUNICATIONS LETTERS, 2008, 12 (10) : 722 - 723
  • [7] Improvement of user authentication protocol with anonymity for wireless communications
    Hu, Bin
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    [J]. KUWAIT JOURNAL OF SCIENCE, 2014, 41 (01) : 155 - 169
  • [8] Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) : 292 - 293
  • [9] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [10] An Enhanced User Authentication Scheme for Wireless Communications
    Cui, Xinchun
    Qin, Xiaolin
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (01): : 155 - 157