Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication

被引:0
|
作者
Khan, Muhammad Asif [1 ]
Kausar, Firdous [1 ]
Masood, Ashraf [1 ]
机构
[1] NUST, Coll Telecommun Engn MCS, Informat Secur Dept, Rawalpindi, Pakistan
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication is the first and most important step in provision of any secure service to the users. It is used to ensure that only authentic users be able to use that secure service. Anonymous authentication is another vital aspect in wireless secure communication. Anonymous authentication is termed as authenticating the user without disclosing his/her identity. Many authentication with anonymity schemes are propose for secure communication in wireless environment. Wireless communication technology is susceptible to many common attacks. In this paper we point out security flaws in recently proposed improved anonymous authentication schemes in wireless communication, in which the inside adversary who register as a legitimate user reveals the identity of user and thus defeat the anonymity. We propose a modified anonymous authentication scheme with enhanced security, covering the security flaws identified in recent schemes.
引用
收藏
页码:198 / 208
页数:11
相关论文
共 50 条
  • [1] An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
    Rui Chen
    Dezhong Peng
    [J]. Wireless Personal Communications, 2017, 97 : 2665 - 2682
  • [2] An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
    Chen, Rui
    Peng, Dezhong
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2665 - 2682
  • [3] Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
    Jung, Jaewook
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    [J]. SENSORS, 2017, 17 (03)
  • [4] Anonymous authentication scheme for mobile communication
    Liu J.
    Gu L.
    Luo S.
    Yang Y.
    Cui J.
    Wu X.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2011, 38 (01): : 176 - 183
  • [5] An anonymous authentication scheme for mobile communication
    Liu Jin-ye
    Gu Li-ze
    Luo Shou-shan
    Yang Yi-xian
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 359 - +
  • [6] Security enhancement on an anonymous authentication scheme for wireless communications using smart cards
    Wu, Xili
    Qu, Juan
    Feng, Yuming
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (05): : 1139 - 1155
  • [7] Security enhanced user authentication scheme for wireless sensor network
    Jannati, Hoda
    Falahati, Abolfazl
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 215 - 228
  • [8] A Security Enhanced Train to Ground Wireless Communication Authentication Key Agreement Scheme for LTE-R
    Wu W.
    Zhang W.
    Wang X.
    Wang Y.
    [J]. Tiedao Xuebao/Journal of the China Railway Society, 2019, 41 (12): : 66 - 74
  • [9] Practical anonymous user authentication scheme with security proof
    Chien, Hung-Yu
    [J]. COMPUTERS & SECURITY, 2008, 27 (5-6) : 216 - 223
  • [10] Security analysis of practical anonymous user authentication scheme with security proof
    Liu, Chenglian
    Lin, Changlu
    Sun, Shuliang
    [J]. Information Technology Journal, 2013, 12 (03) : 522 - 525