By Topic

Security Analysis of Authentication Scheme with Anonymity for Wireless Environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Yongzhuang Wei ; Dept. of Commun. & Inf. Eng., Guilin Univ. of Electron. Technol., Guilin ; Hongbing Qiu ; Yupu Hu

Authentication is the most essential procedure to ensure that the service is properly used for wireless environments. Recently, Zhu and Ma proposed a novel authentication scheme with anonymity for wireless environments by basing on the hash functions and smart card, and mobile users only do symmetric encryption and decryption. And they claimed that their new scheme is security and provide user anonymity and so on. However, in this paper, we show that Zhu-Ma's new authentication scheme don't satisfy anonymity and untractability. Moreover, we still show that the authentication scheme is insecure when the mobile nodes' smart card leaked relative information. Accordingly, we present an improvement anonymous authentication scheme for wireless environments and the performance of our scheme is also analyzed.

Published in:

Communication Technology, 2006. ICCT '06. International Conference on

Date of Conference:

27-30 Nov. 2006