Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks

  • Lei Yang
  • Tsu-Yang WuEmail author
  • Zhiyuan Lee
  • Chien-Ming Chen
  • King-Hang Wang
  • Jeng-Shyang Pan
  • Shu-Chuan Chu
  • Mu-En Wu
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1107)


With the rapid development of mobile networks, secure communication technologies for mobile users are received much attentions from researchers. Recently, Chung et al. proposed an anonymous mutual authentication scheme for communication inter-devices in mobile networks. Some previous literatures are shown that their scheme has some security weaknesses. In this paper, we also point out their scheme violates perfect forward secrecy and is insecure against a replay attack.


  1. 1.
    Chen, C.M., Huang, Y., Wang, E.K., Wu, T.Y.: Improvement of a mutual authentication protocol with anonymity for roaming service in wireless communications. Data Sci. Pattern Recogn. 2(1), 15–24 (2018)Google Scholar
  2. 2.
    Chen, C.M., Wang, K.H., Fang, W., Wu, T.Y., Wang, E.K.: Reconsidering a lightweight anonymous authentication protocol. J. Chin. Inst. Eng. 42(1), 9–14 (2019)CrossRefGoogle Scholar
  3. 3.
    Chen, C.M., Wang, K.H., Wu, T.Y., Wang, E.K.: On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci. Pattern Recogn. 1(2), 1–10 (2017)Google Scholar
  4. 4.
    Chung, Y., Choi, S., Won, D.: Anonymous mutual authentication scheme for secure inter-device communication in mobile networks. In: International Conference on Computational Science and Its Applications, pp. 289–301. Springer, Heidelberg (2016)Google Scholar
  5. 5.
    Feng, Q., He, D., Zeadally, S., Wang, H.: Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Gen. Comput. Syst. 84, 239–251 (2018)CrossRefGoogle Scholar
  6. 6.
    Jegadeesan, S., Azees, M., Kumar, P.M., Manogaran, G., Chilamkurti, N., Varatharajan, R., Hsu, C.H.: An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustain. Cities Soc. 49, 101522 (2019)CrossRefGoogle Scholar
  7. 7.
    Jia, X., He, D., Kumar, N., Choo, K.K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. (2019) Google Scholar
  8. 8.
    Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 (2015)CrossRefGoogle Scholar
  9. 9.
    Korać, D., Simić, D.: Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. Comput. Secur. 85, 313–332 (2019)CrossRefGoogle Scholar
  10. 10.
    Li, C.T., Wu, T.Y., Chen, C.M.: A provably secure group key agreement scheme with privacy preservation for online social networks using extended chaotic maps. IEEE Access 6, 66742–66753 (2018)CrossRefGoogle Scholar
  11. 11.
    Liang, X.C., Wu, T.Y., Lee, Y.Q., Chen, C.M., Yeh, J.H.: Cryptanalysis of a pairing-based anonymous key agreement scheme for smart grid. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp. 125–131. Springer, Heidelberg (2020)Google Scholar
  12. 12.
    Madhusudhan, R., et al.: A secure and lightweight authentication scheme for roaming service in global mobile networks. J. Inf. Secur. Appl. 38, 96–110 (2018)Google Scholar
  13. 13.
    Mo, J., Hu, Z., Lin, Y.: Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography. J. Supercomput. 74(11), 5927–5943 (2018)CrossRefGoogle Scholar
  14. 14.
    Wang, K.H., Chen, C.M., Fang, W., Wu, T.Y.: A secure authentication scheme for internet of things. Pervasive Mob. Comput. 42, 15–26 (2017)CrossRefGoogle Scholar
  15. 15.
    Wu, T.Y., Chen, C.M., Wang, K.H., Meng, C., Wang, E.K.: A provably secure certificateless public key encryption with keyword search. J. Chinese Inst. Eng. 42(1), 20–28 (2019)CrossRefGoogle Scholar
  16. 16.
    Wu, T.Y., Chen, C.M., Wang, K.H., Pan, J.S., Zheng, W., Chu, S.C., Roddick, J.F.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)Google Scholar
  17. 17.
    Wu, T.Y., Chen, C.M., Wang, K.H., Wu, J.M.T.: Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments. IEEE Access 7, 49232–49239 (2019)CrossRefGoogle Scholar
  18. 18.
    Wu, T.Y., Fang, W., Chen, C.M., Wang, G.: Cryptanalysis of an anonymous mutual authentication scheme for secure inter-device communication in mobile networks. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 206–213. Springer, Heidelberg (2017)Google Scholar
  19. 19.
    Xie, Q., Tang, Z., Chen, K.: Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. Comput. Electr. Eng. 59, 218–230 (2017)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Lei Yang
    • 1
  • Tsu-Yang Wu
    • 1
    Email author
  • Zhiyuan Lee
    • 1
  • Chien-Ming Chen
    • 1
  • King-Hang Wang
    • 2
  • Jeng-Shyang Pan
    • 1
  • Shu-Chuan Chu
    • 1
  • Mu-En Wu
    • 3
  1. 1.College of Computer Science and EngineeringShandong University of Science and TechnologyQingdaoChina
  2. 2.Department of Computer Science and EngineeringHong Kong University of Science and TechnologyClear Water BayHong Kong
  3. 3.Department of Information and Finance ManagementNational Taipei University of TechnologyTaipeiTaiwan, R.O.C.

Personalised recommendations