Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global Mobility Networks

  • Youngseok Chung
  • Seokjin Choi
  • Youngsook Lee
  • Dongho Won
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 274)

Abstract

Recently, Chung, Lee, and Won [1] proposed an improved authentication scheme with anonymity which remedies security faults showed by Youn, Park, and Lim [2]. Their improved scheme guarantees anonymity, but does not provide unlinkability. In their scheme, it is possible for attackers to know particular sessions, that have already been occurred several times, are originated by one same user. In this paper, we propose an unlinkable authentication scheme with anonymity by modifying Chung et al.’s scheme. Our scheme provides not only anonymity and security as the previous scheme does, but also unlikability against malicious mobile users. Since proposed scheme still uses only low-cost functions, it is suitable for mobility networks.

Keywords

anonymity linkability authentication mobility network 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chung, Y., Lee, Y., Won, D.: Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks. In: Park, J.J. (J.H.), Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 752–760. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  2. 2.
    Youn, T.Y., Park, Y.H., Lim, J.: Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters 13(7), 471–473 (2009)CrossRefGoogle Scholar
  3. 3.
    Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1), 231–235 (2004)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Lee, C.C., Hwang, M.S., Lio, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5), 1683-1687 (2006) Google Scholar
  5. 5.
    Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letter 12(10), 722–723 (2008)CrossRefGoogle Scholar
  6. 6.
    Jeon, W., Kim, J., Nam, J., Lee, Y., Won, D.: An enhanced secure authentication scheme with anonymity for wireless environments. IEICE Transactions on Communications E95-B(7), 2505–2508 (2012)CrossRefGoogle Scholar
  7. 7.
    Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A(1), 299–302 (2007)CrossRefGoogle Scholar
  8. 8.
    Chang, C.C., Lee, C.Y., Chiu, Y.C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 32, 611–618 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Youngseok Chung
    • 1
    • 2
  • Seokjin Choi
    • 1
  • Youngsook Lee
    • 3
  • Dongho Won
    • 2
  1. 1.Electronics and Telecommunications Research InstituteDaejeonKorea
  2. 2.Department of Computer EngineeringSungkyunkwan UniversitySeoulKorea
  3. 3.Department of Cyber Investigation PoliceHowon UniversitySeoulKorea

Personalised recommendations