Skip to main content

2018 | OriginalPaper | Buchkapitel

Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications

verfasst von : Tsu-Yang Wu, Bin Xiang, Guangjie Wang, Chien-Ming Chen, Eric Ke Wang

Erschienen in: Genetic and Evolutionary Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Liu et al. proposed a mutual authentication protocol with user anonymity for wireless communication. In their paper, the authors claimed that the protocol can resist several kinds of attacks even the secret information stored in the smart card is disclosed. However, we still find two vulnerabilities in this paper. First, this protocol still fails to protect user anonymity. Second, this protocol is vulnerable to an off-line password guessing attack if an adversary can derive the secret information stored in a smart card. To solve the problems, we propose a simple but effective patch to their protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683–1687 (2006)CrossRef Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683–1687 (2006)CrossRef
2.
Zurück zum Zitat Jing, X., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3), 319–325 (2011)CrossRef Jing, X., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3), 319–325 (2011)CrossRef
3.
Zurück zum Zitat Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052–4057 (2010)CrossRefMATHMathSciNet Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052–4057 (2010)CrossRefMATHMathSciNet
4.
Zurück zum Zitat Guo, C., Chang, C.C., Sun, C.Y.: Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications. J. Inf. Hiding Multimedia Sig. Process. 4(2), 99–109 (2013) Guo, C., Chang, C.C., Sun, C.Y.: Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications. J. Inf. Hiding Multimedia Sig. Process. 4(2), 99–109 (2013)
5.
Zurück zum Zitat Liu, C.-S., et al.: Mutual authentication with anonymity for roaming service with smart cards in wireless communications. In: International Conference on Network and System Security. Springer (2016) Liu, C.-S., et al.: Mutual authentication with anonymity for roaming service with smart cards in wireless communications. In: International Conference on Network and System Security. Springer (2016)
6.
Zurück zum Zitat Jebek, E.: Integer factoring and modular square roots. J. Comput. Syst. Sci. 82, 380–394 (2016) Jebek, E.: Integer factoring and modular square roots. J. Comput. Syst. Sci. 82, 380–394 (2016)
7.
Zurück zum Zitat Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. Technical report, Cambridge, MA, USA (1979) Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. Technical report, Cambridge, MA, USA (1979)
8.
Zurück zum Zitat Williams, H.C.: A modification of the RSA public-key encryption procedure (cor-resp.). IEEE Trans. Inf. Theor. 26(6), 726–729 (1980)CrossRefMATH Williams, H.C.: A modification of the RSA public-key encryption procedure (cor-resp.). IEEE Trans. Inf. Theor. 26(6), 726–729 (1980)CrossRefMATH
9.
Zurück zum Zitat Chen, C.M., Li, C.M., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. IEEE Access 5, 3410–3422 (2017)CrossRef Chen, C.M., Li, C.M., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. IEEE Access 5, 3410–3422 (2017)CrossRef
10.
Zurück zum Zitat Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on an improved secure and efficient password and chaos-based two party key agreement protocol. Nonlinear Dyn. 87(3), 2073–2075 (2017)CrossRef Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on an improved secure and efficient password and chaos-based two party key agreement protocol. Nonlinear Dyn. 87(3), 2073–2075 (2017)CrossRef
11.
Zurück zum Zitat Chen, C.M., Xu, L., Wu, T.Y., Li, C.R.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–65 (2016) Chen, C.M., Xu, L., Wu, T.Y., Li, C.R.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–65 (2016)
12.
Zurück zum Zitat Sun, H.M., He, B.Z., Chen, C.M., Wu, T.Y., Lin, C.H., Wang, H.: A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321, 224–237 (2015)CrossRefMathSciNet Sun, H.M., He, B.Z., Chen, C.M., Wu, T.Y., Lin, C.H., Wang, H.: A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321, 224–237 (2015)CrossRefMathSciNet
13.
Zurück zum Zitat Chen, C.M., Wang, K.H., Wu, T.Y., Pan, I.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Trans. Inf. Forensics Secur. 8(8), 1318–1330 (2013)CrossRef Chen, C.M., Wang, K.H., Wu, T.Y., Pan, I.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Trans. Inf. Forensics Secur. 8(8), 1318–1330 (2013)CrossRef
Metadaten
Titel
Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications
verfasst von
Tsu-Yang Wu
Bin Xiang
Guangjie Wang
Chien-Ming Chen
Eric Ke Wang
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6487-6_23