Skip to main content
Log in

An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In wireless communication system, a good protocol should satisfy many requirements: user identity authentication, privacy protection, computational efficiency and resist some known attacks. Thus design a highly secure anonymous authentication protocols for wireless networks is a challenging task. Over recent years, many researchers have proposed their own solutions to address this issue. In 2014, Niu et al. analyzed Yoon et al.’s authentication scheme, then put forward a smart card based authentication scheme with anonymity for wireless networks. They claimed their scheme achieves many security requirements and resists some known threats. Nevertheless, after detailed analysis, we prove that the scheme of Niu et al. is prone to some malicious attacks such as replay attacks and DoS attacks. Moreover, the scheme does not work when large amount of mobile users access a foreign agent simultaneously. To overcome these drawbacks, we present a new secure authentication scheme with user anonymity by improving Niu et al.’s scheme. The proposed protocol not only satisfies many security properties, such as strong anonymity, mutual authentication and periodically update session key, but also resists well-known threats. Furthermore, the security and performance analyses indicates that the new scheme is well suitable for wireless communications when it is compared with previous protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Hsiang, H.-C., & Shih, W.-K. (2009). Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118–1123.

    Article  Google Scholar 

  2. Chang, C.-C., Lee, C.-Y., & Chiu, Y.-C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(8), 611–618.

    Article  Google Scholar 

  3. He, D., Mab, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(8), 367–374.

    Article  Google Scholar 

  4. Das, A. K. (2013). A secure and effective user authentication and privacypreserving protocol with smart cards for wireless communications. Networking Science, 2, 12–27.

    Article  Google Scholar 

  5. Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 51(21), 230–234.

    Google Scholar 

  6. Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.

    Article  Google Scholar 

  7. Wu, C.-C., Lee, W.-B., & Tsaur, W.-J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(2), 722–723.

    Google Scholar 

  8. Li, C.-T., & Lee, C.-C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Elsevier, 55, 35–44.

    MathSciNet  MATH  Google Scholar 

  9. Niu, J., & Li, X. (2014). A novel user authentication scheme with anonymity for wireless communications. Security and Communication Networks, 7(7), 1467–1476.

    Google Scholar 

  10. Yoon, E.-J., Yoo, K.-Y., & Ha, K.-S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers and Electrical Engineering, 37, 356–364.

    Article  Google Scholar 

  11. Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78, 247–269. 7.

    Article  Google Scholar 

  12. Kang, M., Rhee, H. S., & Choi, J. Y. (2011). Improved user authentication scheme with user anonymity for wireless communications. Ieice Trans Fundamentals, 94(2), 860–864.

    Article  Google Scholar 

  13. Hu, B., Xie, Q., Bao, M., & Dong, N. (2014). Improvement of user authentication protocol with anonymity for wireless communications. Kuwait Journal of Science, 41(1), 155–169.

    Google Scholar 

  14. Wen, F., Susilo, W., & Yang, G. (2014). A robust smart cardbased anonymous user authentication protocol for wireless communications. Security & Communication Networks, 7(6), 987–993.

    Article  Google Scholar 

  15. Farash, M. S., Chaudhry, S. A., Heydari, M., Sadough, S. M. S., Kumari, S., & Khan, M. K. (2015). A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems. doi:10.1002/dac.3019.

  16. Shin, S., Yeh, H., & Kim, K. (2015). An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Networking and Applications, 8(4), 1–10.

    Article  Google Scholar 

  17. Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 73(3), 993–1004.

    Article  Google Scholar 

  18. Chung, Y., Choi, S., Lee, Y., Park, N., & Won, D. (2016). An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653.

    Article  Google Scholar 

  19. Djellali, B., Belarbi, K., Chouarfia, A., & Lorenz, P. (2015). User authentication scheme preserving anonymity for ubiquitous devices. Security & Communication Networks, 8(17), 3131–3141.

    Article  Google Scholar 

  20. Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 72(10), 3826–3849.

    Article  Google Scholar 

  21. Xiong, H., Wang, X., & Li, F. (2012). Security flaw of an improved user authentication scheme with user anonymity for wireless communications. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences, 95-A, 256–258.

    Article  Google Scholar 

  22. Kang, D., Mun, J., Lee, D., & Won, D. (2015). Cryptanalysis of user authentication scheme preserving anonymity for ubiquitous devices. In: D. S. Park, H. C. Chao, Y. S. Jeong, & J. Park (Eds.), Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering. (Vol. 373, pp. 309–315)

  23. Irshad, A., & Chaudhry, S. A. (2016). Comments on a privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 4(73), 1504–1508.

    Google Scholar 

  24. Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. Berlin: Springer.

    MATH  Google Scholar 

  25. Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In: M. Wiener (Ed.), Advances in Cryptology (CRYPTO'99), Lecture Notes in Computer Science (Vol. 166, pp. 388–397). Heidelberg: Springer.

  26. Ts, M., Ea, D., & Rh, S. (2002). Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.

    Article  MathSciNet  Google Scholar 

  27. Needham, R. M. (1993). Denial of service. In Proceedings of the 1st ACM conference on computer and communications security, series CCS ’93 (pp. 151–153). New York, NY, USA: ACM. http://doi.acm.org/10.1145/168588.168607

  28. Eastlake 3rd, D., & Jones, P. (2001). US Secure Hash Algorithm 1 (SHA1), RFC 3174. doi:10.17487/RFC3174.

  29. Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.

    Book  MATH  Google Scholar 

  30. Buchmann, J. (2004). Introduction to cryptography (2nd ed.). New York: Springer.

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, R., Peng, D. An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications. Wireless Pers Commun 97, 2665–2682 (2017). https://doi.org/10.1007/s11277-017-4629-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4629-x

Keywords

Navigation