Skip to main content

Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks

  • Conference paper
  • First Online:
Advances in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2017)

Abstract

Anonymous authentication allows one entity to be authenticated by the other without revealing the identity information. In mobile networks, mobile devices communicate with each other to exchange resources. To achieve anonymous mutual authentication, the devices are anonymously authenticated under the trusted server. Recently, Chung et al. proposed a efficient anonymous mutual authentication scheme for inter-device communication using only low-cost functions, such as hash functions and exclusive-or operations. However, we find that their protocol does not preserve user’s privacy in terms of untraceability. Also, their protocol is vulnerable to a denial of service attack and a user impersonation attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhang, Z., Yang, K., Hu, X., Wang, Y.: Practical anonymous password authentication and tls with anonymous client authentication. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179–1191. ACM (2016)

    Google Scholar 

  2. Shin, S., Kobara, K.: Simple anonymous password-based authenticated key exchange (sapake), reconsidered. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100, 639–652 (2017)

    Article  Google Scholar 

  3. Tsang, P.P., Smith, S.W.: Ppaa: peer-to-peer anonymous authentication. In: International Conference on Applied Cryptography and Network Security, pp. 55–74. Springer (2008)

    Google Scholar 

  4. Lu, L., Han, J., Liu, Y., Hu, L., Huai, J.P., Ni, L., Ma, J.: Pseudo trust: Zero-knowledge authentication in anonymous p2ps. IEEE Trans. Parallel Distrib. Syst. 19(10), 1325–1337 (2008)

    Article  Google Scholar 

  5. Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2flip: a two-factor lightweight privacy-preserving authentication scheme for vanet. IEEE Trans. Veh. Technol. 65(2), 896–911 (2016)

    Article  Google Scholar 

  6. Chen, C.M., Li, C.T., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. IEEE Access 5, 3410–3422 (2017)

    Article  Google Scholar 

  7. Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on an improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn. 87, 1–3 (2016)

    Google Scholar 

  8. Chen, C.M., Xu, L., Wu, T.Y., Li, C.R.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 2, 61–65 (2016)

    Google Scholar 

  9. Chen, C.M., Wang, K.H., Wu, T.Y., Pan, J.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Trans. Inf. Forensics Secur. 8(8), 1318–1330 (2013)

    Article  Google Scholar 

  10. Chen, C.M., Chen, S.M., Zheng, X., Yan, L., Wang, H., Sun, H.M.: Pitfalls in an ecc-based lightweight authentication protocol for low-cost rfid. J. Inf. Hiding Multimedia Sig. Process. 5(4), 642–648 (2014)

    Google Scholar 

  11. Zhao, D., Peng, H., Li, L., Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 78(1), 247–269 (2014)

    Article  Google Scholar 

  12. Gope, P., Hwang, T.: Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wirel. Pers. Commun. 82(4), 2231–2245 (2015)

    Article  Google Scholar 

  13. Wang, E.K., Cao, Z., Wu, T.Y., Chen, C.M.: Mapmp: a mutual authentication protocol for mobile payment. J. Inf. Hiding Multimedia Sig. Process. 6(4), 697–707 (2015)

    Google Scholar 

  14. Shin, S., Yeh, H., Kim, K.: An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-peer Netw. Appl. 8(4), 674–683 (2015)

    Article  Google Scholar 

  15. Farash, M.S., Chaudhry, S.A., Heydari, M., Sadough, S., Mohammad, S., Kumari, S., Khan, M.K.: A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. (2015)

    Google Scholar 

  16. Chung, Y., Choi, S., Won, D.: Anonymous mutual authentication scheme for secure inter-device communication in mobile networks. In: International Conference on Computational Science and Its Applications, pp. 289–301. Springer (2016)

    Google Scholar 

Download references

Acknowledgement

The work of Chien-Ming Chen was supported in part by the Project NSFC (National Natural Science Foundation of China) under Grant number 61402135 and in part by Shenzhen Strategic Emerging Industries Program under Grants No. ZDSY20120613125016389.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Ming Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Wu, TY., Fang, W., Chen, CM., Wang, G. (2018). Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks. In: Pan, JS., Tsai, PW., Watada, J., Jain, L. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2017. Smart Innovation, Systems and Technologies, vol 81. Springer, Cham. https://doi.org/10.1007/978-3-319-63856-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63856-0_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63855-3

  • Online ISBN: 978-3-319-63856-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics