Skip to main content
Erschienen in: Wireless Personal Communications 2/2014

01.01.2014

Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks

verfasst von: Debiao He, Yuanyuan Zhang, Jianhua Chen

Erschienen in: Wireless Personal Communications | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication protocols with anonymity attracted wide attention since they could protect users’ privacy in wireless communications. Recently, Hsieh and Leu proposed an anonymous authentication protocol based on elliptic curve Diffie–Hellman problem for wireless access networks and claimed their protocol could provide anonymity. However, by proposing a concrete attack, we point out that their protocol cannot provide user anonymity. To overcome its weakness, we propose an improved protocol. We also provide an analysis of our proposed protocol to prove its superiority, even though its computational cost is slightly higher.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Juang, W., Lei, C., & Chang, C. (1999). Anonymous channel and authentication in wireless communications. Computer Communications, 22, 1502–1511.CrossRef Juang, W., Lei, C., & Chang, C. (1999). Anonymous channel and authentication in wireless communications. Computer Communications, 22, 1502–1511.CrossRef
2.
Zurück zum Zitat Rahman, M., & Imai, H. (2002). Security in wireless communication. Wireless Personal Communications, 22(2), 213–228.CrossRef Rahman, M., & Imai, H. (2002). Security in wireless communication. Wireless Personal Communications, 22(2), 213–228.CrossRef
3.
Zurück zum Zitat Harn, L., & Lin, H. (1993). Authentication in wireless communications. In IEEE Global Telecommunications Conference (GLOBECOM ’93) (pp. 550–554). Harn, L., & Lin, H. (1993). Authentication in wireless communications. In IEEE Global Telecommunications Conference (GLOBECOM ’93) (pp. 550–554).
4.
Zurück zum Zitat Barbancho, A., & Peinado, A. (2003). Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Computer Networks, 43, 777–785.CrossRefMATH Barbancho, A., & Peinado, A. (2003). Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Computer Networks, 43, 777–785.CrossRefMATH
5.
Zurück zum Zitat Lee, C., Hwang, M., & Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRef Lee, C., Hwang, M., & Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRef
6.
Zurück zum Zitat Peinado, A. (2004). Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications, 27, 1709–1715.CrossRef Peinado, A. (2004). Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications, 27, 1709–1715.CrossRef
7.
Zurück zum Zitat Lin, W., & Jan, J. (2001). A wireless-based authentication and anonymous channels for large scale area. In Proceedings of the IEEE symposium on computers and communications, 2001 (pp. 36–41). Lin, W., & Jan, J. (2001). A wireless-based authentication and anonymous channels for large scale area. In Proceedings of the IEEE symposium on computers and communications, 2001 (pp. 36–41).
8.
Zurück zum Zitat Fathi, H., Shin, S., Kobara, K., & Imai, H. (2007) Protocols for authenticated anonymous communications. In 18th International symposium on personal, indoor and mobile radio, communications (PIMRC07) (pp. 1–5). Fathi, H., Shin, S., Kobara, K., & Imai, H. (2007) Protocols for authenticated anonymous communications. In 18th International symposium on personal, indoor and mobile radio, communications (PIMRC07) (pp. 1–5).
9.
Zurück zum Zitat He, D. (2012). Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications. ETRI Journal, 34(3), 482–484.CrossRef He, D. (2012). Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications. ETRI Journal, 34(3), 482–484.CrossRef
10.
Zurück zum Zitat Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231–235.CrossRefMathSciNet Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231–235.CrossRefMathSciNet
11.
Zurück zum Zitat Lee, C., Chang, C., & Lin, C. (2005). User authentication with anonymity for global mobility networks. In 2th Asia pacific conference on mobile technology, applications and systems (pp. 1–5). Lee, C., Chang, C., & Lin, C. (2005). User authentication with anonymity for global mobility networks. In 2th Asia pacific conference on mobile technology, applications and systems (pp. 1–5).
12.
Zurück zum Zitat Chen, Y., Chuang, S., Yeh, L., & Huang, J. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366–1375.CrossRef Chen, Y., Chuang, S., Yeh, L., & Huang, J. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366–1375.CrossRef
13.
Zurück zum Zitat Yang, C., Tang, Y., Wang, R., & Yang, H. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431–1439.CrossRefMATHMathSciNet Yang, C., Tang, Y., Wang, R., & Yang, H. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431–1439.CrossRefMATHMathSciNet
14.
Zurück zum Zitat Hsieh, W., & Leu, J. (2012). Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wireless Communications and Mobile Computing, doi:10.1002/wcm.2252. Hsieh, W., & Leu, J. (2012). Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wireless Communications and Mobile Computing, doi:10.​1002/​wcm.​2252.
16.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transaction on Computer System, 8(1), 18–36.CrossRef Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transaction on Computer System, 8(1), 18–36.CrossRef
17.
Zurück zum Zitat He, D., & Wu, S. (2012). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, doi:10.1007/s11277-012-0696-1. He, D., & Wu, S. (2012). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, doi:10.​1007/​s11277-012-0696-1.
18.
Zurück zum Zitat Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769.CrossRef Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769.CrossRef
19.
20.
Zurück zum Zitat Kocher, P., Jaffe, J., & Jun, J. (1999) Differential power analysis. In Proceedings of advances in cryptology (CRYPTO 99) (pp. 388–397). Kocher, P., Jaffe, J., & Jun, J. (1999) Differential power analysis. In Proceedings of advances in cryptology (CRYPTO 99) (pp. 388–397).
21.
Zurück zum Zitat Messerges, T., Dabbish, E., & Sloan, R. (2002). Examining smart- card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.CrossRefMathSciNet Messerges, T., Dabbish, E., & Sloan, R. (2002). Examining smart- card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.CrossRefMathSciNet
22.
Zurück zum Zitat Li, C., Hwang, M., & Chung, Y. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communication, 31, 2803–2814.CrossRef Li, C., Hwang, M., & Chung, Y. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communication, 31, 2803–2814.CrossRef
Metadaten
Titel
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
verfasst von
Debiao He
Yuanyuan Zhang
Jianhua Chen
Publikationsdatum
01.01.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1282-x

Weitere Artikel der Ausgabe 2/2014

Wireless Personal Communications 2/2014 Zur Ausgabe

Neuer Inhalt