Improved User Authentication Scheme with User Anonymity for Wireless Communications

被引:18
|
作者
Kang, Miyoung [1 ]
Rhee, Hyun Sook [2 ]
Choi, Jin-Young [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[2] Korea Univ, Grad Sch Informat Management & Secur, Seoul 136701, South Korea
关键词
authentication; anonymity; wireless communications;
D O I
10.1587/transfun.E94.A.860
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a user authentication scheme with user anonymity for wireless communications. Previous works have some weaknesses such as (1) user identity can be revealed from the login message, and (2) after a smart card is no longer valid or is expired, users having the expired smart cards can generate valid login messages under the assumption that the server does not maintain the user information. In this letter, we propose a new user authentication scheme for providing user anonymity. In the proposed scheme, the server is capable of detecting forged login messages by users having only expired smart cards and their passwords without storing user information on the server.
引用
收藏
页码:860 / 864
页数:5
相关论文
共 50 条
  • [1] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [2] Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Xiong, Hu
    Wang, Xiaofeng
    Li, Fagen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 256 - 258
  • [3] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476
  • [4] A user friendly authentication scheme with anonymity for wireless communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Ha, Keum-Sook
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (03) : 356 - 364
  • [5] Improved remote user authentication scheme preserving user anonymity
    Hu, Lanlan
    Yang, Yixian
    Niu, Xinxin
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 323 - +
  • [6] Improvement of user authentication protocol with anonymity for wireless communications
    Hu, Bin
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    KUWAIT JOURNAL OF SCIENCE, 2014, 41 (01) : 155 - 169
  • [7] An Improved User Authentication and Key Agreement Scheme Providing User Anonymity
    Ya-Fen Chang and Pei-Yu Chang Department of Computer Science and Information Engineering
    Journal of Electronic Science and Technology, 2011, 9 (04) : 352 - 358
  • [8] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [9] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [10] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417