Security Flaws in Authentication Protocols with Anonymity for Wireless Environments

被引:24
|
作者
Xu, Jing [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
Wireless security; roaming service; anonymity; authentication; key agreement; smart card; SCHEME;
D O I
10.4218/etrij.09.0209.0026
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The emerging wireless networks require the design of new authentication protocols due to their dynamic nature and vulnerable-to-attack structure. Recently, Wu and others proposed a wireless authentication protocol which is claimed to be an improvement of the authentication protocol proposed by Lee and others which provides user anonymity. In this letter we show that these protocols have a common flaw and that these protocols fail to provide user anonymity. We also propose a modification method to solve this problem.
引用
收藏
页码:460 / 462
页数:3
相关论文
共 50 条
  • [1] Security analysis of authentication scheme with anonymity for wireless environments
    Wei, Yongzhuang
    Qiu, Hongbing
    Hu, Yupu
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 535 - +
  • [2] Security flaws and improvement of an ID-based wireless authentication scheme with anonymity
    Jiang, Qi
    Li, Guang-Song
    Ma, Jian-Feng
    [J]. Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 209 - 216
  • [3] Security enhancement on a new authentication scheme with anonymity for wireless environments
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Liao, I-En
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (05) : 1683 - 1687
  • [4] A new authentication scheme with anonymity for wireless environments
    Zhu, JM
    Ma, JF
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 231 - 235
  • [5] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [6] Secure Authentication Scheme with Improved Anonymity for Wireless Environments
    Lee, JongHyup
    Kwon, Taekyoung
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (02) : 554 - 557
  • [7] An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments
    Jeon, Woongryul
    Kim, Jeeyeon
    Nam, Junghyun
    Lee, Youngsook
    Won, Dongho
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (07) : 2505 - 2508
  • [8] Security flaws in authentication and key establishment protocols for mobile communications
    Shim, K
    Lee, YR
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 62 - 74
  • [9] Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) : 292 - 293
  • [10] Security Flaws in Wireless Sensor Networks and Authentication Procedures for Internet of Things
    Irshad, Reyazur Rashid
    Shaman, Faisal
    Mehdi, Mohammed
    Islam, Asharul
    Rasool, Mohammad Ashiquee
    Khan, Imran Mohd
    Alattab, Ahmed Abdu
    Alnfrawy, Ehab Tawfeek
    Fatima, Kainat
    [J]. JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2023, 18 (02) : 237 - 242