2012
DOI: 10.1002/sec.601
|View full text |Cite
|
Sign up to set email alerts
|

A novel user authentication scheme with anonymity for wireless communications

Abstract: User authentication and privacy protection are important issues for wireless and mobile communication systems such as GSM, 3G, and 4G wireless networks. Recently, Yoon et al. proposed a user‐friendly authentication scheme with anonymity for wireless communications. However, in this paper, we show that user anonymity of their scheme is not achieved under the eavesdropping attack and their scheme is not fair in the key agreement. In order to ensure security authentication and protect user anonymity for wireless … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 27 publications
(49 reference statements)
0
9
0
Order By: Relevance
“…Based on elliptic curve cryptography, Yoon et al [26] proposed a user-friendly authentication protocol for GLOMONET. However, Niu and Li [27] found that their scheme had the same drawbacks as the scheme in [24]. In 2012, Mun et al [28] proposed an improved authentication scheme for GLOMONET.…”
Section: Introductionmentioning
confidence: 99%
“…Based on elliptic curve cryptography, Yoon et al [26] proposed a user-friendly authentication protocol for GLOMONET. However, Niu and Li [27] found that their scheme had the same drawbacks as the scheme in [24]. In 2012, Mun et al [28] proposed an improved authentication scheme for GLOMONET.…”
Section: Introductionmentioning
confidence: 99%
“…Yoon et al [ 25 ] presented a new lightweight authentication protocol to handle the loopholes of different protocol with the features of mutual authentication, user friendliness, User anonymity. Niu et al [ 26 ] pointed out the Yoon et al [ 25 ] protocol and proved that protocol does not provide user anonymity and also has an insecure key management system. Therefore, Niu.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, Niu. [ 26 ] presented a novel based authentication protocol that provides the feature of user anonymity. Jiang et al [ 27 ] also pointed out that He et al protocol [ 21 ] does not provide strong of two-factor authentication furthermore, the protocol is vulnerable to insider attack, replay attack and failure of user friendliness.…”
Section: Introductionmentioning
confidence: 99%
“…Later, Shin et al came up with a novel authentication scheme and claimed that their scheme attained all the security requirements. Later, some other anonymous authentication schemes in ubiquitous networks for accessing roaming services were proposed. However, all these schemes are insecure against known attacks.…”
Section: Introductionmentioning
confidence: 99%