Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks

Authentication protocols with anonymity attracted wide attention since they could protect users’ privacy in wireless communications. Recently, Hsieh and Leu proposed an anonymous authentication protocol based on elliptic curve Diffie–Hellman problem for wireless access networks and claimed their protocol could provide anonymity. However, by proposing a concrete attack, we point out that their protocol cannot provide user anonymity. To overcome its weakness, we propose an improved protocol. We also provide an analysis of our proposed protocol to prove its superiority, even though its computational cost is slightly higher.

[1]  Cheng-Chi Lee,et al.  Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.

[2]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[3]  Debiao He Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications , 2012 .

[4]  Lein Harn,et al.  Authentication in wireless communications , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.

[5]  Bin Wang,et al.  A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme , 2012, Wireless Personal Communications.

[6]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[7]  Jianfeng Ma,et al.  A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..

[8]  SeongHan Shin,et al.  Protocols for Authenticated Anonymous Communications , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[9]  Alberto Peinado,et al.  Privacy and authentication protocol providing anonymous channels in GSM , 2004, Comput. Commun..

[10]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[11]  Hung-Wen Yang,et al.  A secure and efficient authentication protocol for anonymous channel in wireless communications , 2005, Appl. Math. Comput..

[12]  Ana M. Barbancho,et al.  Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications , 2003, Comput. Networks.

[13]  Debiao He,et al.  Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment , 2012, Wireless Personal Communications.

[14]  Hideki Imai,et al.  Security in Wireless Communication , 2002, Wirel. Pers. Commun..

[15]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[16]  Yen-Cheng Chen,et al.  A practical authentication protocol with anonymity for wireless access networks , 2011, Wirel. Commun. Mob. Comput..

[17]  Samir Kouro,et al.  Unidimensional Modulation Technique for Cascaded Multilevel Converters , 2009, IEEE Transactions on Industrial Electronics.

[18]  Jian Ma,et al.  An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards , 2012, J. Netw. Comput. Appl..

[19]  Jenq-Shiou Leu,et al.  Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks , 2014, Wirel. Commun. Mob. Comput..

[20]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[21]  Jinn-ke Jan,et al.  A wireless-based authentication and anonymous channels for large scale area , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.

[22]  W.-S. Juang,et al.  Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..