An Improved User Authentication Scheme for Wireless Communications

  • Woongryul Jeon
  • Jeeyeon Kim
  • Junghyun Nam
  • Youngsook Lee
  • Dongho Won
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 107)

Abstract

Recently, wireless communications using mobile device are growing rapidly. The most advantage of wireless communication is that user can transfer various information to anywhere at any time using mobile device. However, to ensure security of communications, authentication is being magnified as an important issue in wireless communication. Recently, in 2011, Cui and Qin pointed out that Wu et al.’s scheme is failed to provide user anonymity and proposed an improved scheme. However, in this paper, we discuss that Cui et al.’s scheme is still vulnerable to malicious FA and does not provide perfect forward secrecy. Finally, we will propose an improved scheme to overcome these vulnerabilities.

Keywords

Wireless communication Anonymity User authentication Security 

References

  1. 1.
    Nam J, Paik J, Kang H, Kim U, Won D (2009) An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun Lett pp 205–207Google Scholar
  2. 2.
    Jeong H, Won D, Kim S (2010) Weakness and improvement of secure hash-based strong password authentication protocol. J Inform Sci Eng 26(5):1845–1858Google Scholar
  3. 3.
    Zhu J, Ma J (2009) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1) 13(3): 230–234Google Scholar
  4. 4.
    Lee CC, Hwang MS, Liao IE (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 53(5):1683–1687CrossRefGoogle Scholar
  5. 5.
    Wu CC, Lee WB, Tsaur WJ (2008) A secure authentication scheme with anonymity for wireless communications. IEEE Commun Lett 12(10):722–723CrossRefGoogle Scholar
  6. 6.
    Cui X, Qin X (2011) An enhanced user authentication scheme for wireless communications. IEICE Trans Info Syst E94-D(1):155–157CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media B.V. 2011

Authors and Affiliations

  • Woongryul Jeon
    • 1
  • Jeeyeon Kim
    • 1
  • Junghyun Nam
    • 2
  • Youngsook Lee
    • 3
  • Dongho Won
    • 1
  1. 1.School of Information and Communication EngineeringSungkyunkwan UniversitySuwon-siKorea
  2. 2.Department of Computer ScienceKonkuk UniversityChungju-siKorea
  3. 3.Department of Cyber Investigation PoliceHowon UniversityGunsan-siKorea

Personalised recommendations