Skip to main content

Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications

  • Conference paper
  • First Online:
Network and System Security (NSS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9955))

Included in the following conference series:

Abstract

Most of the mutual authentication protocols with user anonymity proposed for providing secure roaming service through wireless communications are based on smart cards and have to establish public key cryptosystems in advance. To solve this, Guo et al. firstly proposed an efficient mutual authentication protocol with user anonymity using smart card for wireless communications. Unfortunately, we will demonstrate their scheme requires high modular exponential operations for security issues, and does not allow users to change passwords freely. Based on modular square root, we propose an efficient remote user authentication protocol with smart cards for wireless communications. Compared with others, our protocol is more suitable for mobile devices and smart-card users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Guo, C., Chang, C.C., Sun, C.Y.: Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications. J. Inf. Hiding Multimedia Sig. Process. 4(2), 99–109 (2013)

    Google Scholar 

  2. He, D., Ma, M., Zhang, Y., Chen, C., Jiajun, B.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367–374 (2011)

    Article  Google Scholar 

  3. Campello de Souzac, R.M., Limaa, J.B., Panariob, D.: Public-key encryption based on chebyshev polynomials over gf(q). Inf. Process. Lett. 111, 51–56 (2010)

    Article  MathSciNet  Google Scholar 

  4. Jebek, E.: Integer factoring and modular square roots. J. Comput. Syst. Sci. 82, 380–394 (2016)

    Article  MathSciNet  Google Scholar 

  5. Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683–1687 (2006)

    Article  Google Scholar 

  6. Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. Technical report, Cambridge, MA, USA (1979)

    Google Scholar 

  7. Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052–4057 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  8. Williams, H.C.: A modification of the rsa public-key encryption procedure (corresp.). IEEE Trans. Inf. Theory 26(6), 726–729 (1980)

    Article  MATH  Google Scholar 

  9. Jing, X., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3), 319–325 (2011)

    Article  Google Scholar 

  10. Yoon, E.J., Jeon, I.S.: An efficient and secure diffie-hellman key agreement protocol based on chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383–2389 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  11. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3), 669–674 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  12. Zhou, T., Jing, X.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205–213 (2011)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hung-Min Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Liu, CS., Xu, L., Lin, L., Tseng, MC., Lin, SY., Sun, HM. (2016). Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds) Network and System Security. NSS 2016. Lecture Notes in Computer Science(), vol 9955. Springer, Cham. https://doi.org/10.1007/978-3-319-46298-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46298-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46297-4

  • Online ISBN: 978-3-319-46298-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics