Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

06.07.2017

An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications

verfasst von: Rui Chen, Dezhong Peng

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In wireless communication system, a good protocol should satisfy many requirements: user identity authentication, privacy protection, computational efficiency and resist some known attacks. Thus design a highly secure anonymous authentication protocols for wireless networks is a challenging task. Over recent years, many researchers have proposed their own solutions to address this issue. In 2014, Niu et al. analyzed Yoon et al.’s authentication scheme, then put forward a smart card based authentication scheme with anonymity for wireless networks. They claimed their scheme achieves many security requirements and resists some known threats. Nevertheless, after detailed analysis, we prove that the scheme of Niu et al. is prone to some malicious attacks such as replay attacks and DoS attacks. Moreover, the scheme does not work when large amount of mobile users access a foreign agent simultaneously. To overcome these drawbacks, we present a new secure authentication scheme with user anonymity by improving Niu et al.’s scheme. The proposed protocol not only satisfies many security properties, such as strong anonymity, mutual authentication and periodically update session key, but also resists well-known threats. Furthermore, the security and performance analyses indicates that the new scheme is well suitable for wireless communications when it is compared with previous protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hsiang, H.-C., & Shih, W.-K. (2009). Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118–1123.CrossRef Hsiang, H.-C., & Shih, W.-K. (2009). Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118–1123.CrossRef
2.
Zurück zum Zitat Chang, C.-C., Lee, C.-Y., & Chiu, Y.-C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(8), 611–618.CrossRef Chang, C.-C., Lee, C.-Y., & Chiu, Y.-C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(8), 611–618.CrossRef
3.
Zurück zum Zitat He, D., Mab, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(8), 367–374.CrossRef He, D., Mab, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(8), 367–374.CrossRef
4.
Zurück zum Zitat Das, A. K. (2013). A secure and effective user authentication and privacypreserving protocol with smart cards for wireless communications. Networking Science, 2, 12–27.CrossRef Das, A. K. (2013). A secure and effective user authentication and privacypreserving protocol with smart cards for wireless communications. Networking Science, 2, 12–27.CrossRef
5.
Zurück zum Zitat Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 51(21), 230–234. Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 51(21), 230–234.
6.
Zurück zum Zitat Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRef Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRef
7.
Zurück zum Zitat Wu, C.-C., Lee, W.-B., & Tsaur, W.-J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(2), 722–723. Wu, C.-C., Lee, W.-B., & Tsaur, W.-J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(2), 722–723.
8.
Zurück zum Zitat Li, C.-T., & Lee, C.-C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Elsevier, 55, 35–44.MathSciNetMATH Li, C.-T., & Lee, C.-C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Elsevier, 55, 35–44.MathSciNetMATH
9.
Zurück zum Zitat Niu, J., & Li, X. (2014). A novel user authentication scheme with anonymity for wireless communications. Security and Communication Networks, 7(7), 1467–1476. Niu, J., & Li, X. (2014). A novel user authentication scheme with anonymity for wireless communications. Security and Communication Networks, 7(7), 1467–1476.
10.
Zurück zum Zitat Yoon, E.-J., Yoo, K.-Y., & Ha, K.-S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers and Electrical Engineering, 37, 356–364.CrossRef Yoon, E.-J., Yoo, K.-Y., & Ha, K.-S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers and Electrical Engineering, 37, 356–364.CrossRef
11.
Zurück zum Zitat Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78, 247–269. 7.CrossRef Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78, 247–269. 7.CrossRef
12.
Zurück zum Zitat Kang, M., Rhee, H. S., & Choi, J. Y. (2011). Improved user authentication scheme with user anonymity for wireless communications. Ieice Trans Fundamentals, 94(2), 860–864.CrossRef Kang, M., Rhee, H. S., & Choi, J. Y. (2011). Improved user authentication scheme with user anonymity for wireless communications. Ieice Trans Fundamentals, 94(2), 860–864.CrossRef
13.
Zurück zum Zitat Hu, B., Xie, Q., Bao, M., & Dong, N. (2014). Improvement of user authentication protocol with anonymity for wireless communications. Kuwait Journal of Science, 41(1), 155–169. Hu, B., Xie, Q., Bao, M., & Dong, N. (2014). Improvement of user authentication protocol with anonymity for wireless communications. Kuwait Journal of Science, 41(1), 155–169.
14.
Zurück zum Zitat Wen, F., Susilo, W., & Yang, G. (2014). A robust smart cardbased anonymous user authentication protocol for wireless communications. Security & Communication Networks, 7(6), 987–993.CrossRef Wen, F., Susilo, W., & Yang, G. (2014). A robust smart cardbased anonymous user authentication protocol for wireless communications. Security & Communication Networks, 7(6), 987–993.CrossRef
15.
Zurück zum Zitat Farash, M. S., Chaudhry, S. A., Heydari, M., Sadough, S. M. S., Kumari, S., & Khan, M. K. (2015). A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems. doi:10.1002/dac.3019. Farash, M. S., Chaudhry, S. A., Heydari, M., Sadough, S. M. S., Kumari, S., & Khan, M. K. (2015). A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems. doi:10.​1002/​dac.​3019.
16.
Zurück zum Zitat Shin, S., Yeh, H., & Kim, K. (2015). An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Networking and Applications, 8(4), 1–10.CrossRef Shin, S., Yeh, H., & Kim, K. (2015). An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Networking and Applications, 8(4), 1–10.CrossRef
17.
Zurück zum Zitat Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 73(3), 993–1004.CrossRef Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 73(3), 993–1004.CrossRef
18.
Zurück zum Zitat Chung, Y., Choi, S., Lee, Y., Park, N., & Won, D. (2016). An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653.CrossRef Chung, Y., Choi, S., Lee, Y., Park, N., & Won, D. (2016). An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653.CrossRef
19.
Zurück zum Zitat Djellali, B., Belarbi, K., Chouarfia, A., & Lorenz, P. (2015). User authentication scheme preserving anonymity for ubiquitous devices. Security & Communication Networks, 8(17), 3131–3141.CrossRef Djellali, B., Belarbi, K., Chouarfia, A., & Lorenz, P. (2015). User authentication scheme preserving anonymity for ubiquitous devices. Security & Communication Networks, 8(17), 3131–3141.CrossRef
20.
Zurück zum Zitat Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 72(10), 3826–3849.CrossRef Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 72(10), 3826–3849.CrossRef
21.
Zurück zum Zitat Xiong, H., Wang, X., & Li, F. (2012). Security flaw of an improved user authentication scheme with user anonymity for wireless communications. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences, 95-A, 256–258.CrossRef Xiong, H., Wang, X., & Li, F. (2012). Security flaw of an improved user authentication scheme with user anonymity for wireless communications. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences, 95-A, 256–258.CrossRef
22.
Zurück zum Zitat Kang, D., Mun, J., Lee, D., & Won, D. (2015). Cryptanalysis of user authentication scheme preserving anonymity for ubiquitous devices. In: D. S. Park, H. C. Chao, Y. S. Jeong, & J. Park (Eds.), Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering. (Vol. 373, pp. 309–315) Kang, D., Mun, J., Lee, D., & Won, D. (2015). Cryptanalysis of user authentication scheme preserving anonymity for ubiquitous devices. In: D. S. Park, H. C. Chao, Y. S. Jeong, & J. Park (Eds.), Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering. (Vol. 373, pp. 309–315)
23.
Zurück zum Zitat Irshad, A., & Chaudhry, S. A. (2016). Comments on a privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 4(73), 1504–1508. Irshad, A., & Chaudhry, S. A. (2016). Comments on a privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 4(73), 1504–1508.
24.
Zurück zum Zitat Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. Berlin: Springer.MATH Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. Berlin: Springer.MATH
25.
Zurück zum Zitat Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In: M. Wiener (Ed.), Advances in Cryptology (CRYPTO'99), Lecture Notes in Computer Science (Vol. 166, pp. 388–397). Heidelberg: Springer. Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In: M. Wiener (Ed.), Advances in Cryptology (CRYPTO'99), Lecture Notes in Computer Science (Vol. 166, pp. 388–397). Heidelberg: Springer.
26.
Zurück zum Zitat Ts, M., Ea, D., & Rh, S. (2002). Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.CrossRefMathSciNet Ts, M., Ea, D., & Rh, S. (2002). Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.CrossRefMathSciNet
29.
Zurück zum Zitat Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.CrossRefMATH Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.CrossRefMATH
30.
Metadaten
Titel
An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
verfasst von
Rui Chen
Dezhong Peng
Publikationsdatum
06.07.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4629-x

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt