An Efficient User Authentication Scheme with Smart Cards for Wireless Communications

Since 2004, several user authentication schemes purpose to provide user anonymity in wireless communication have been announced, however, many of them failed to provide user anonymity, actually. In 2011, Li and Lee proposed a secure user authentication scheme for wireless communications. Differently from the previous researches, Li and Lee claimed two more session keys to enhance entire security of the scheme. However, to fulfil their claim, Li and Lee adopted Diffie-Hellman key agreement method in their scheme, and it required plenty of resources. Thus, in this paper, we point out inefficiency of Li and Lee’s scheme and propose a more efficient user authentication scheme for wireless communications.

[1]  Dongho Won,et al.  Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[2]  Chin-Chen Chang,et al.  An on-line electronic check system with mutual authentication , 2009, Comput. Electr. Eng..

[3]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[4]  Wei-Bin Lee,et al.  A new method for using hash functions to solve remote user authentication , 2008, Comput. Electr. Eng..

[5]  Cheng-Chi Lee,et al.  A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..

[6]  Jiann-Liang Chen,et al.  Enhancing WLAN/UMTS Dual-Mode Services Using a Novel Distributed Multi-Agent Scheduling Scheme , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).

[7]  Dongho Won,et al.  Enhancement of two-factor authenticated key exchange protocols in public wireless LANs , 2010, Comput. Electr. Eng..

[8]  Hongke Zhang,et al.  A network-based mobility management scheme for future Internet , 2010, Comput. Electr. Eng..

[9]  Sheng Zhong Identity-based mix: Anonymous communications without public key certificates , 2009, Comput. Electr. Eng..

[10]  Qiong Pu,et al.  An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[11]  Jianfeng Ma,et al.  A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..

[12]  Dongho Won,et al.  Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[13]  Wei-Bin Lee,et al.  A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..

[14]  Dong Hoon Lee,et al.  Security flaw of authentication scheme with anonymity for wireless communications , 2009, IEEE Communications Letters.

[15]  Cheng-Chi Lee,et al.  Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.

[16]  Wen-Shenq Juang,et al.  Two efficient two-factor authenticated key exchange protocols in public wireless LANs , 2009, Comput. Electr. Eng..

[17]  Zhenfu Cao,et al.  An efficient anonymous authentication mechanism for delay tolerant networks , 2010, Comput. Electr. Eng..

[18]  Sheng Zhong Efficient, anonymous, and authenticated conference key setup in cellular wireless networks , 2008, Comput. Electr. Eng..

[19]  Dongho Won,et al.  Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks , 2008, IEEE Communications Letters.

[20]  Wei-Bin Lee,et al.  A self-verification authentication mechanism for mobile satellite communication systems , 2009, Comput. Electr. Eng..