An Improved User Authentication Scheme for Wireless Communications
Recently, wireless communications using mobile device are growing rapidly. The most advantage of wireless communication is that user can transfer various information to anywhere at any time using mobile device. However, to ensure security of communications, authentication is being magnified as an important issue in wireless communication. Recently, in 2011, Cui and Qin pointed out that Wu et al.’s scheme is failed to provide user anonymity and proposed an improved scheme. However, in this paper, we discuss that Cui et al.’s scheme is still vulnerable to malicious FA and does not provide perfect forward secrecy. Finally, we will propose an improved scheme to overcome these vulnerabilities.
KeywordsWireless communication Anonymity User authentication Security
- 1.Nam J, Paik J, Kang H, Kim U, Won D (2009) An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun Lett pp 205–207Google Scholar
- 2.Jeong H, Won D, Kim S (2010) Weakness and improvement of secure hash-based strong password authentication protocol. J Inform Sci Eng 26(5):1845–1858Google Scholar
- 3.Zhu J, Ma J (2009) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1) 13(3): 230–234Google Scholar