Abstract
Recently, with the growth of the smartphone, wireless communi-cations using mobile device are growing rapidly around the world. The most advantage of the wireless communication is that a mobile user can communicate various data to anywhere at any time. However, to ensure the security of the communications, the authentication is being magnified as an important issue in wireless communication. After Zhu and Ma, various studies are announced, and in 2008, Wang et al. pointed out that Wu et al.’s scheme is failed to provide user anonymity and proposed an improved scheme. However, in this paper, we discuss that Wang et al.’s scheme is still vulnerable to a malicious adversary and does not provide user anonymity.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (2011-0004751).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nam, J., Paik, J., Kang, H., Kim, U., Won, D.: An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communication Letters, 205–207 (2009)
Jeong, H., Won, D., Kim, S.: Weakness and Improvement of Secure Hash-based Strong Password Authentication Protocol. Journal of Information Science and Engineering 26(5), 1845–1858 (2010)
Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1), 230–234 (2009), 13(3)
Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5), 1683–1687 (2006)
Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letter 12(10), 722–723 (2008)
Wang, C.H., Wei, T.C., Lee, P.C., Wu, C.C.: An improvement of secure authentication scheme with full anonymity for wireless communications. In: Proceedings of ICIS 2009, pp. 115–118 (2009)
Yoon, E., Yoo, K., Ha, K.: A user friendly authentication scheme with anonymity for wireless communications. Computer and Electrical Engineering 37(3), 356–364 (2011)
Li, C.T., Lee, C.C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Material and Computer Modeling 55(1-2), 35–44 (2012)
Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Jeon, W., Kim, J., Lee, Y., Won, D. (2012). Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_28
Download citation
DOI: https://doi.org/10.1007/978-94-007-5083-8_28
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5082-1
Online ISBN: 978-94-007-5083-8
eBook Packages: EngineeringEngineering (R0)