Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.6.53

Privacy Weakness Analysis of Delegation-Based Authentication Protocol  

Youn, Taek-Young (ETRI)
Kim, Chang-Han (Semyung University)
Abstract
Recently, Lee et al. proposed a delegation-based authentication protocol for secure and private roaming service in global mobility networks. In this paper, we show that the protocol cannot protect the privacy of an user even though the protocol provides the user anonymity. To prove the weakness, we show that the protocol cannot provide the unlinkability and also examine the weakness of the protocol caused by the lack of the unlinkability.
Keywords
Privacy; Authentication; Security Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M.J. Beller, L.F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Sel. Areas Commun., vol. 11, pp. 821-829, Aug. 1993.   DOI   ScienceOn
2 H.-Y. Lin and L. Harn, "Authentication protocols with non-repudiation services in personnel communication systems," IEEE Commun. Lett., vol. 3, no. 8, pp. 236-238, Aug 1999.   DOI   ScienceOn
3 H.-Y. Lin, "Security and authentication in PCS,' Comput. Elect. Eng., vol. 25, no. 4, pp. 225-248, Jul. 1999.   DOI   ScienceOn
4 W.-B. Lee and C.-K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Trans. Wireless Commun, vol. 4, no. 1, pp. 57-64, Jan. 2005.   DOI
5 M. Rahnema, "Overview of the GSM system and protocol architecture," IEEE Commun. Mag., pp. 92-100, Apr. 1993.
6 M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, pp. 734-742, Mar. 2005.   DOI
7 C.C. Lo and Y.J. Chen, "Secure communication mechanisms for GSM networks," IEEE Trans. Consum. Electron., vol. 45, pp. 1074-1080, Nov. 1999.   DOI   ScienceOn
8 T.-F. Lee, C.-C. Chang, and T. Hwang, "Private authentication techniques for the global mobility network," Wireless Personal Commun., vol. 35, no. 4, pp. 329-336, Dec. 2005.   DOI   ScienceOn
9 T.-F. Lee, S.-H. Chang, T. Hwang, and S.-K. Chong, "Enhanced Delegation- Based Authentication Protocol for PCSs," IEEE Transactions on Wireless Communications, vol. 8, no. 5, pp. 2166-2171, May 2009.   DOI