A robust smart card-based anonymous user authentication protocol for wireless communications

被引:23
|
作者
Wen, Fengtong [1 ,2 ]
Susilo, Willy [2 ]
Yang, Guomin [2 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan 250022, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
remote user authentication; mobile computing; smart card; user anonymity; wireless network; SCHEME; SECURITY;
D O I
10.1002/sec.816
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart cardbased anonymous user authentication protocol for wireless communications. The scheme can protect user privacy and is believed to be secure against a range of network attacks even if the secret information stored in the smart card is compromised. In this paper, we reanalyze the security of Das' scheme, and show that the scheme is in fact insecure against impersonation attacks. We then propose a new smart cardbased anonymous user authentication protocol for wireless communications. Compared with the existing schemes, our protocol uses a different user authentication mechanism, which does not require different entities to maintain a synchronized clock. We show that the proposed new protocol can provide stronger security and better efficiency and scalability than previous schemes.
引用
收藏
页码:987 / 993
页数:7
相关论文
共 50 条
  • [1] ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement
    Cherbal, Sarra
    Benchetioui, Rania
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109
  • [2] Provable analysis and improvement of smart card-based anonymous authentication protocols
    Far, Saeed Banaeian
    Alagheband, Mahdi R.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)
  • [3] Performance analysis of smart card-based fingerprint recognition for secure user authentication
    Gil, YH
    Chung, YW
    Dosung, A
    Moon, JH
    Kim, HK
    [J]. TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 87 - 96
  • [4] More secure smart card-based remote user password authentication scheme with user anonymity
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2039 - 2053
  • [5] Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
    Horng, Wen-Bing
    Peng, Jian-Wen
    Liu, Chao-Sheng
    Chiu, Ying-Ching
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS 2012), 2012,
  • [6] Smart card-based secure authentication protocol in multi-server IoT environment
    Won-il Bae
    Jin Kwak
    [J]. Multimedia Tools and Applications, 2020, 79 : 15793 - 15811
  • [7] Smart card-based secure authentication protocol in multi-server IoT environment
    Bae, Won-il
    Kwak, Jin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 15793 - 15811
  • [8] A Random Increasing Sequence Hash Chain and Smart Card-Based Remote User Authentication Scheme
    Fan, Jian-Wei
    Chan, Chao-Wen
    Chang, Ya-Fen
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [9] Security Improvement on Smart card-based Remote User Authentication Scheme using Hash Function
    Kim, Youngil
    Choi, Younsung
    Won, Dongho
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,
  • [10] A Robust and Efficient Smart Card Based Dynamic Identity Authentication Protocol
    Rahaman, Zabi Ur K.
    Giri, M.
    Mrudula
    Vorugunti, Chandra Sekhar
    [J]. 2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 71 - 75