Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications

被引:3
|
作者
Lee, Cheng-Chi [1 ,2 ]
Lin, Tsung-Hung [3 ]
Tsai, Chwei-Shyong [4 ]
机构
[1] Asia Univ, Dept Informat & Commun Engn, Taichung, Taiwan
[2] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[3] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taiping City, Taichung, Taiwan
[4] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 40227, Taiwan
关键词
anonymous channel; cryptanalysis; security; wireless communication;
D O I
10.1002/sec.430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To enhance the efficiency and the security in an anonymous channel of wireless systems, Yang et al. proposed a secure and efficient authentication protocol for an anonymous channel in wireless communications. The protocol did not use asymmetric cryptosystems to protect the identity of the mobile user because the cryptosystems have high complex and high computation cost. Not only can the protocol resist some security attacks but also the computation cost is low. However, the authors shall point out that their protocol is vulnerable to key compromise attack. Through this attack, any adversary can obtain the secret key Kh,?i shared between the home network (HN) and the mobile station (MS). Then, the adversary can wiretap any messages that he/she wants using the secret key between the HN and the MS. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1375 / 1378
页数:4
相关论文
共 50 条
  • [41] A robust smart card-based anonymous user authentication protocol for wireless communications
    Wen, Fengtong
    Susilo, Willy
    Yang, Guomin
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 987 - 993
  • [42] A practical anonymous authentication protocol for wireless roaming
    Xie, Qi
    Tan, Xiao
    Wong, Duncan S.
    Wang, Guilin
    Bao, Mengjie
    Dong, Na
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1264 - 1273
  • [43] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Mir, Omid
    Munilla, Jorge
    Kumari, Saru
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 79 - 91
  • [44] An efficient anonymous user authentication and key agreement protocol for wireless sensor networks
    Kumar, Devender
    Grover, Harmanpreet Singh
    Kaur, Damandeep
    Verma, Adarsh
    Saini, Khushil Kumar
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (05)
  • [45] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Omid Mir
    Jorge Munilla
    Saru Kumari
    Peer-to-Peer Networking and Applications, 2017, 10 : 79 - 91
  • [46] Secure and efficient mutual user authentication protocol for wireless sensor networks
    Yang, Qinghua
    Wang, Liejun
    Liu, Qi
    Wang, Mingwei
    Journal of Software Engineering, 2014, 8 (03): : 184 - 193
  • [47] Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network
    Amir, Nur Afiqah Suzelan
    Othman, Wan Ainun Mior
    Wong, Kok Bin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (05): : 1450 - 1470
  • [49] An efficient and secure mutual authentication protocol in wireless body area network
    Kumar M.
    Hussain S.Z.
    EAI Endorsed Transactions on Pervasive Health and Technology, 2023, 9 : 1 - 13
  • [50] An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
    Rui Chen
    Dezhong Peng
    Wireless Personal Communications, 2017, 97 : 2665 - 2682