Abstract
Authentication is the first and most important step in provision of any secure service to the users. It is used to ensure that only authentic users be able to use that secure service.Anonymous authentication is another vital aspect in wireless secure communication. Anonymous authentication is termed as authenticating the user without disclosing his/her identity. Many authentication with anonymity schemes are propose for secure communication in wireless environment. Wireless communication technology is susceptible to many common attacks. In this paper we point out security flaws in recently proposed improved anonymous authentication schemes in wireless communication, in which the inside adversary who register as a legitimate user reveals the identity of user and thus defeat the anonymity. We propose a modified anonymous authentication scheme with enhanced security, covering the security flaws identified in recent schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yang, G., Huang, Q., Wong, D., Deng, X.: Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications 9(1), 168–174 (2010)
Chang, C.C., Lee, C.Y., Lee, W.B.: Cryptanalysis and improvement of a secure authentication scheme with anonymity for wireless communications. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, September 2009, pp. 902–904 (2009)
Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1), 231–235 (2004)
Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5), 1683–1687 (2006)
Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters 12(10), 722–723 (2008)
Zeng, P., Cao, Z., Kwang Choo, K., Wang, S.: On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters 13(3), 170–171 (2009)
seon Lee, J., Chang, J., Lee, D.: Security aw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters 13(5), 292–293 (2009)
Xinchun, C., Xinheng, W.: An improved user authentication scheme for wireless mesh networks. In: IEEE International Symposium on IT in Medicine and Education, ITIME 2009, August 2009, vol. 1, pp. 915–918 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khan, M.A., Kausar, F., Masood, A. (2010). Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)