Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks

被引:59
作者
He, Debiao [1 ,2 ]
Zhang, Yuanyuan [1 ]
Chen, Jianhua [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
Wireless networks; Authentication; Anonymity; Elliptic curve Diffie-Hellman; SECURITY; EFFICIENT; CHANNEL; SCHEME; PRIVACY;
D O I
10.1007/s11277-013-1282-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Authentication protocols with anonymity attracted wide attention since they could protect users' privacy in wireless communications. Recently, Hsieh and Leu proposed an anonymous authentication protocol based on elliptic curve Diffie-Hellman problem for wireless access networks and claimed their protocol could provide anonymity. However, by proposing a concrete attack, we point out that their protocol cannot provide user anonymity. To overcome its weakness, we propose an improved protocol. We also provide an analysis of our proposed protocol to prove its superiority, even though its computational cost is slightly higher.
引用
收藏
页码:229 / 243
页数:15
相关论文
共 22 条
  • [1] Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
    Barbancho, AM
    Peinado, A
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (06): : 777 - 785
  • [2] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [3] A practical authentication protocol with anonymity for wireless access networks
    Chen, Yen-Cheng
    Chuang, Shu-Chuan
    Yeh, Lo-Yao
    Huang, Jiun-Long
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (10) : 1366 - 1375
  • [4] Fathi H., 2007, 18 INT S PERS IND MO, P1
  • [5] Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
    He, Debiao
    Wu, Shuhua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (01) : 323 - 329
  • [6] He DB, 2012, ETRI J, V34, P482, DOI [10.4218/etrij.11.0211.0340, 10.4218/etrij.12.0211.0340]
  • [7] Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (10) : 995 - 1006
  • [8] Anonymous channel and authentication in wireless communications
    Juang, WS
    Lei, CL
    Chang, CY
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (15-16) : 1502 - 1511
  • [9] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
  • [10] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388