2013
DOI: 10.1002/sec.858
|View full text |Cite
|
Sign up to set email alerts
|

A practical anonymous authentication protocol for wireless roaming

Abstract: Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous roaming in wireless access networks, then the protocol is further improved by Hsieh and Leu. In this paper, we demonstrate the adversarial model of this type of protocols and show that Hsieh‐Leu scheme is not as secure as they originally claimed to be. In particular, we show that their protocol does not provide user privacy protection, and it is vulnerable to off‐line password guessing attack mounted by a side channel a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 24 publications
(36 reference statements)
0
1
0
Order By: Relevance
“…Attack resistance Due to the open environment, the DA scheme for the SG is susceptible to many kinds of attacks. To ensure security, it is necessary that the DA scheme could withstand those attacks such as internal attack, the impersonation attack, the reply attack, the modification attack and the man-in-the-middle attack [18][19][20][21][22][23][24].…”
Section: Security Requirementsmentioning
confidence: 99%
“…Attack resistance Due to the open environment, the DA scheme for the SG is susceptible to many kinds of attacks. To ensure security, it is necessary that the DA scheme could withstand those attacks such as internal attack, the impersonation attack, the reply attack, the modification attack and the man-in-the-middle attack [18][19][20][21][22][23][24].…”
Section: Security Requirementsmentioning
confidence: 99%