A novel wireless authentication protocol preserving user anonymity and untraceability

被引:0
|
作者
Wei, Yongzhuang [1 ]
Qiu, Hongbing [1 ]
机构
[1] Guilin Univ Elect Technol, Dept Commun & Informat Engn, Guilin, Guangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we present a novel wireless authentication protocol with providing mobile users anonymity and untraceability. Our scheme is based on smart card and public key cryptosystems, and mobile users only do hash operation and symmetric decryption. In our protocol, mobile users change their passwords freely and securely without the help of the corresponding home network or the visited network, while also providing secure mutual authentication. The most significant feature is that provides perfect confidentiality to mobile user's identity and the session keys even though the secret parameters in smart card have been leaked completely. Finally, the performance of our scheme is analyzed.
引用
收藏
页码:575 / +
页数:2
相关论文
共 50 条
  • [1] Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    Park, CS
    [J]. COMPUTER NETWORKS, 2004, 44 (02) : 267 - 273
  • [2] Improvement of user authentication protocol with anonymity for wireless communications
    Hu, Bin
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    [J]. KUWAIT JOURNAL OF SCIENCE, 2014, 41 (01) : 155 - 169
  • [3] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    [J]. Multimedia Tools and Applications, 2017, 76 : 13401 - 13423
  • [4] A lightweight authentication and key agreement protocol preserving user anonymity
    Nikooghadam, Morteza
    Jahantigh, Reza
    Arshad, Hamed
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13401 - 13423
  • [5] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476
  • [6] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
    Yang, Xu
    Huang, Xinyi
    Liu, Joseph K.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 190 - 195
  • [7] An anonymity-preserving mobile user authentication protocol for global roaming services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    [J]. COMPUTER NETWORKS, 2023, 221
  • [8] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
  • [9] Improved remote user authentication scheme preserving user anonymity
    Hu, Lanlan
    Yang, Yixian
    Niu, Xinxin
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 323 - +
  • [10] A Remote User Authentication Scheme Preserving User Anonymity and Traceability
    Shao, Shuai
    Li, Hui
    Niu, Xinxi
    Yang, Yixian
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5255 - 5258