期刊论文详细信息
ETRI Journal
Security Flaws in Authentication Protocols with Anonymity for Wireless Environments
关键词: smart card;    key agreement;    authentication;    anonymity;    roaming service;    Wireless security;   
Others  :  1185800
DOI  :  10.4218/etrij.09.0209.0026
PDF
【 摘 要 】

The emerging wireless networks require the design of new authentication protocols due to their dynamic nature and vulnerable-to-attack structure. Recently, Wu and others proposed a wireless authentication protocol which is claimed to be an improvement of the authentication protocol proposed by Lee and others which provides user anonymity. In this letter, we show that these protocols have a common flaw and that these protocols fail to provide user anonymity. We also propose a modification method to solve this problem.

【 授权许可】

   

【 预 览 】
附件列表
Files Size Format View
20150520114642344.pdf 193KB PDF download
【 参考文献 】
  • [1]J. Zhu and J. Ma, "A New Authentication Scheme with Anonymity for Wireless Environments," IEEE Trans. Consum. Electron., vol. 50, no. 1, Feb. 2004, pp. 231-235.
  • [2]C.C. Lee and M.S. Hwang, "Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments," IEEE Trans. Ind. Electron., vol. 53, no. 5, Oct. 2006, pp. 1683-1686.
  • [3]C.C. Wu, W.B. Lee, and W.J. Tsaur, "A Secure Authentication Scheme with Anonymity for Wireless Communications," IEEE Commun. Lett., vol. 12, no. 10, Oct. 2008, pp. 722-723.
  文献评价指标  
  下载次数:7次 浏览次数:17次