scispace - formally typeset
Journal ArticleDOI

A Secure Authentication Scheme with Anonymity for Wireless Communications

TLDR
This paper will discuss a few problems found in the enhanced scheme and then propose how to overcome them, regarding the properties of anonymity and backward secrecy.
Abstract
Recently, a new authentication scheme with anonymity for wireless communications has been proposed, and then some security problems have been demonstrated. In this paper, we will discuss a few problems found in the enhanced scheme and then propose how to overcome them, regarding the properties of anonymity and backward secrecy.

read more

Citations
More filters
Journal ArticleDOI

A strong user authentication scheme with smart cards for wireless communications

TL;DR: A secure and light-weight authentication scheme with user anonymity for wireless communications that is secure in the case that the information stored in thesmart card is disclosed but the user password of the smart card owner is unknown to the attacker.
Journal ArticleDOI

On the anonymity of two-factor authentication schemes for wireless sensor networks

TL;DR: A general principle is put forward: Public-key techniques are intrinsically indispensable to construct a two-factor authentication scheme that can support user anonymity, and can be applied to two-Factor schemes for universal environments besides WSNs, such as the Internet, global mobility networks and mobile clouds.
Journal ArticleDOI

Enhanced three-factor security protocol for consumer USB mass storage devices

TL;DR: This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack.
Journal ArticleDOI

Enhanced authentication scheme with anonymity for roaming service in global mobility networks

TL;DR: This article shows that Lee-Hwang-Liao's scheme cannot provide anonymity under the forgery attack, and a novel authentication scheme to overcome these weaknesses that is efficient, secure, and suitable for battery-powered mobile devices in global mobility networks is proposed.
Journal ArticleDOI

Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards

TL;DR: This paper strengthens the security of the scheme by addressing untraceability property such that any third party over the communication channel cannot tell whether or not he has seen the same (unknown) smart card twice through the authentication sessions.
References
More filters
Journal ArticleDOI

A new authentication scheme with anonymity for wireless environments

TL;DR: This paper presents a new and efficient wireless authentication protocol providing user anonymity based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption.
Journal ArticleDOI

Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments

TL;DR: The scheme proposed in this paper can enhance the security of Zhu and Ma's scheme and is also simple and efficient.
Related Papers (5)