DOI QR코드

DOI QR Code

Security Flaws in Authentication Protocols with Anonymity for Wireless Environments

  • Xu, Jing (State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences) ;
  • Feng, Dengguo (State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences)
  • Received : 2009.01.16
  • Accepted : 2009.05.11
  • Published : 2009.08.30

Abstract

The emerging wireless networks require the design of new authentication protocols due to their dynamic nature and vulnerable-to-attack structure. Recently, Wu and others proposed a wireless authentication protocol which is claimed to be an improvement of the authentication protocol proposed by Lee and others which provides user anonymity. In this letter, we show that these protocols have a common flaw and that these protocols fail to provide user anonymity. We also propose a modification method to solve this problem.

Keywords

References

  1. J. Zhu and J. Ma, “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Trans. Consum. Electron., vol. 50, no. 1, Feb. 2004, pp. 231-235. https://doi.org/10.1109/TCE.2004.1277867
  2. C.C. Lee and M.S. Hwang, “Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Trans. Ind. Electron., vol. 53, no. 5, Oct. 2006, pp. 1683-1686.
  3. C.C. Wu, W.B. Lee, and W.J. Tsaur, “A Secure Authentication Scheme with Anonymity for Wireless Communications,” IEEE Commun. Lett., vol. 12, no. 10, Oct. 2008, pp. 722-723. https://doi.org/10.1109/LCOMM.2008.080283

Cited by

  1. Anonymous authentication with unlinkability for wireless environments vol.8, pp.8, 2009, https://doi.org/10.1587/elex.8.536
  2. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks vol.12, pp.7, 2011, https://doi.org/10.1631/jzus.c1000377
  3. A strong user authentication scheme with smart cards for wireless communications vol.34, pp.3, 2009, https://doi.org/10.1016/j.comcom.2010.02.031
  4. A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks vol.84, pp.3, 2009, https://doi.org/10.1007/s11277-015-2524-x
  5. Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments vol.11, pp.11, 2009, https://doi.org/10.1155/2015/305785
  6. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks vol.16, pp.10, 2009, https://doi.org/10.3390/s16101653