Skip to main content

Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity

  • Conference paper

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 180))

Abstract

Recently, with the growth of the smartphone, wireless communi-cations using mobile device are growing rapidly around the world. The most advantage of the wireless communication is that a mobile user can communicate various data to anywhere at any time. However, to ensure the security of the communications, the authentication is being magnified as an important issue in wireless communication. After Zhu and Ma, various studies are announced, and in 2008, Wang et al. pointed out that Wu et al.’s scheme is failed to provide user anonymity and proposed an improved scheme. However, in this paper, we discuss that Wang et al.’s scheme is still vulnerable to a malicious adversary and does not provide user anonymity.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (2011-0004751).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nam, J., Paik, J., Kang, H., Kim, U., Won, D.: An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communication Letters, 205–207 (2009)

    Google Scholar 

  2. Jeong, H., Won, D., Kim, S.: Weakness and Improvement of Secure Hash-based Strong Password Authentication Protocol. Journal of Information Science and Engineering 26(5), 1845–1858 (2010)

    Google Scholar 

  3. Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1), 230–234 (2009), 13(3)

    MathSciNet  Google Scholar 

  4. Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5), 1683–1687 (2006)

    Article  Google Scholar 

  5. Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letter 12(10), 722–723 (2008)

    Article  Google Scholar 

  6. Wang, C.H., Wei, T.C., Lee, P.C., Wu, C.C.: An improvement of secure authentication scheme with full anonymity for wireless communications. In: Proceedings of ICIS 2009, pp. 115–118 (2009)

    Google Scholar 

  7. Yoon, E., Yoo, K., Ha, K.: A user friendly authentication scheme with anonymity for wireless communications. Computer and Electrical Engineering 37(3), 356–364 (2011)

    Article  Google Scholar 

  8. Li, C.T., Lee, C.C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Material and Computer Modeling 55(1-2), 35–44 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  9. Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Woongryul Jeon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Jeon, W., Kim, J., Lee, Y., Won, D. (2012). Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5083-8_28

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5082-1

  • Online ISBN: 978-94-007-5083-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics