A new authentication scheme with anonymity for wireless environments

Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is somewhat more concentrated and complex than that of wired network. Authentication is the most essential procedure to ensure that the service is properly used. But its limited resource, such as weak power supplies and limited bandwidth, must be taken into account in the design of security schemes. In this paper, we present a new and efficient wireless authentication protocol providing user anonymity. Our scheme is based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. Finally, the performance of our scheme is analyzed.

[1]  Kwangjo Kim,et al.  Wireless Authentication Protocol Preserving User Anonymity , 2001 .

[2]  Yi-Bing Lin,et al.  Improving the fault tolerance of GSM networks , 1998, IEEE Netw..

[3]  Martin Grötschel,et al.  Survivable mobile phone network architectures: models and solution methods , 1998 .

[4]  Hideki Imai,et al.  Security in Wireless Communication , 2002, Wirel. Pers. Commun..

[5]  Günther Horn,et al.  Authentication and Payment in Future Mobile Systems , 1998, J. Comput. Secur..

[6]  Wen-Guey Tzeng,et al.  Authentication of Mobile Users in Third Generation Mobile Systems , 2001, Wirel. Pers. Commun..

[7]  Prashant Krishnamurthy,et al.  Security architecture for wireless residential networks , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).