Skip to main content

Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications

  • Conference paper
  • First Online:
  • 652 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 579))

Abstract

Recently, Liu et al. proposed a mutual authentication protocol with user anonymity for wireless communication. In their paper, the authors claimed that the protocol can resist several kinds of attacks even the secret information stored in the smart card is disclosed. However, we still find two vulnerabilities in this paper. First, this protocol still fails to protect user anonymity. Second, this protocol is vulnerable to an off-line password guessing attack if an adversary can derive the secret information stored in a smart card. To solve the problems, we propose a simple but effective patch to their protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683–1687 (2006)

    Article  Google Scholar 

  2. Jing, X., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3), 319–325 (2011)

    Article  Google Scholar 

  3. Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052–4057 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  4. Guo, C., Chang, C.C., Sun, C.Y.: Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications. J. Inf. Hiding Multimedia Sig. Process. 4(2), 99–109 (2013)

    Google Scholar 

  5. Liu, C.-S., et al.: Mutual authentication with anonymity for roaming service with smart cards in wireless communications. In: International Conference on Network and System Security. Springer (2016)

    Google Scholar 

  6. Jebek, E.: Integer factoring and modular square roots. J. Comput. Syst. Sci. 82, 380–394 (2016)

    Google Scholar 

  7. Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. Technical report, Cambridge, MA, USA (1979)

    Google Scholar 

  8. Williams, H.C.: A modification of the RSA public-key encryption procedure (cor-resp.). IEEE Trans. Inf. Theor. 26(6), 726–729 (1980)

    Article  MATH  Google Scholar 

  9. Chen, C.M., Li, C.M., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. IEEE Access 5, 3410–3422 (2017)

    Article  Google Scholar 

  10. Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on an improved secure and efficient password and chaos-based two party key agreement protocol. Nonlinear Dyn. 87(3), 2073–2075 (2017)

    Article  Google Scholar 

  11. Chen, C.M., Xu, L., Wu, T.Y., Li, C.R.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–65 (2016)

    Google Scholar 

  12. Sun, H.M., He, B.Z., Chen, C.M., Wu, T.Y., Lin, C.H., Wang, H.: A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321, 224–237 (2015)

    Article  MathSciNet  Google Scholar 

  13. Chen, C.M., Wang, K.H., Wu, T.Y., Pan, I.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Trans. Inf. Forensics Secur. 8(8), 1318–1330 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

The work of Chien-Ming Chen was supported in part by the Project NSFC (National Natural Science Foundation of China) under Grant number 61402135 and in part by Shenzhen Technical Project under Grant number JCYJ20170307151750788. The work of Eric Ke Wang was supported in part by National Natural Science Foundation of China (No. 61572157), grant No. 2016A030313660 from Guangdong Province Natural Science Foundation, JCYJ20160608161351559 from Shenzhen Municipal Science and Technology Innovation Project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Ming Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Wu, TY., Xiang, B., Wang, G., Chen, CM., Wang, E.K. (2018). Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. In: Lin, JW., Pan, JS., Chu, SC., Chen, CM. (eds) Genetic and Evolutionary Computing. ICGEC 2017. Advances in Intelligent Systems and Computing, vol 579. Springer, Singapore. https://doi.org/10.1007/978-981-10-6487-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6487-6_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6486-9

  • Online ISBN: 978-981-10-6487-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics