Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks

With the rapid development of mobile networks, secure communication technologies for mobile users are received much attentions from researchers. Recently, Chung et al. proposed an anonymous mutual authentication scheme for communication inter-devices in mobile networks. Some previous literatures are shown that their scheme has some security weaknesses. In this paper, we also point out their scheme violates perfect forward secrecy and is insecure against a replay attack.

[1]  Dongho Won,et al.  Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks , 2016, ICCSA.

[2]  Dejan Simic,et al.  Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment , 2019, Comput. Secur..

[3]  Chien-Ming Chen,et al.  Reconsidering a lightweight anonymous authentication protocol , 2019, Journal of the Chinese Institute of Engineers.

[4]  Sherali Zeadally,et al.  Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment , 2017, Future Gener. Comput. Syst..

[5]  Tsu-Yang Wu,et al.  Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks , 2017, IIH-MSP.

[6]  R. Saravanan,et al.  A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks , 2015, Wirel. Pers. Commun..

[7]  Kefei Chen,et al.  Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks , 2017, Comput. Electr. Eng..

[8]  R. Madhusudhan,et al.  A secure and lightweight authentication scheme for roaming service in global mobile networks , 2018, J. Inf. Secur. Appl..

[9]  Chien-Ming Chen,et al.  A provably secure certificateless public key encryption with keyword search , 2019, Journal of the Chinese Institute of Engineers.

[10]  Chien-Ming Chen,et al.  Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.

[11]  Kim-Kwang Raymond Choo,et al.  A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing , 2020, IEEE Systems Journal.

[12]  Gunasekaran Manogaran,et al.  An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications , 2019, Sustainable Cities and Society.

[13]  Chun-Ta Li,et al.  A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps , 2018, IEEE Access.

[14]  Chien-Ming Chen,et al.  A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..

[15]  Yuhua Lin,et al.  Remote user authentication and key agreement for mobile client–server environments on elliptic curve cryptography , 2018, The Journal of Supercomputing.

[16]  Tsu-Yang Wu,et al.  Cryptanalysis of a Pairing-Based Anonymous Key Agreement Scheme for Smart Grid , 2020 .