Secure Authentication Scheme with User Privacy for Wireless Network Environment
DOI:
https://doi.org/10.51983/ajcst-2012.1.1.1687Keywords:
Authentication, Smartcard, Security, Anonymity, Wireless networksAbstract
Mobile users enjoy seamless roaming over wireless environment. The wireless network is cumbersome and error prone, thus there is a need for a good and strong authentication scheme which should be designed in such a way that it retains the privacy of the user .It should also be capable of providing minimized communication overhead as most of the exchange of messages in wireless network is found to be the exchange of messages meant for authentication. This results in clumsy environment .The proposed scheme brings out the solution for the above mentioned problems, where the authentication procedure consists of only four messages exchanged between home agent, mobile user and foreign agent. Also the light weight authentication scheme with user anonymity is presented. Apart from that other main issues that are to be solved are prevention of fraud, updating of session key periodically, no need of password verification table and single registration of user to home network. It provides security in protecting the password even if the information is disclosed. The proposed scheme deserves the property of protecting the wireless network from various attacks. And the proposed scheme is simple and user friendly.
References
C.-S. Park, Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems, Computer Networks 44 (2004) 267–273.
H.-Y. Chien, J.-K. Jan, Y.-M. Tseng, An efficient and practical solution to remote authentication: smart card, Computers & Security 21 (4) (2002) 372–375.
C.C. Lee, M.S. Hwang, I.E. Liao, Security enhancement on a new authentication schemewith anonymity for wireless environments, IEEE Transactions on Consumer Electronics 53 (5) (2006) 1683–1687.
C.C. Wu, W.B. Lee, W.J. Tsaur, A secure authentication scheme with anonymity for wireless communications, IEEE Communication Letter 12 (10) (2008) 722–723.
P. Zeng, Z. Cao, K.-K.R. Choo, S. Wang, On the anonymity of some authentication schemes for wireless communications, IEEE Communication Letter 13 (3) (2009) 170–171.
J.-S. Lee, J.H. Chang, D.H. Lee, Security flaw of authentication scheme with anonymity for wireless communications, IEEE Communication Letter 13 (5) (2009) 292–293.
J. Xu, D. Feng, Security flaws in authentication protocols with anonymity for wireless environments, ETRI Journal 31 (4) (2009) 460–462.
J.-L. Tsai, Efficient multi-server authentication scheme based on one-way hash function without verification table, Computers & Security 27 (3-4) (2008) 115–121.
Y.-P. Liao, S.-S. Wang, A secure dynamic ID based remote user authentication scheme for multi- server environment, Computer Standards & Interfaces 31 (1) (2009) 24–29.
H.-C. Hsiang, W.-K. Shih, Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment, Computer Standards & Interfaces 31 (6) (2009).
T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks, IEEE Transactions on Computer 51 (5) (2002) 541–552.
P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: Proceeding of the Advances in Cryptology (CRYPTO’99), 1999, pp. 388–397.
National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard, US Federal Information Processing Standard Publication 180-2, 2002.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.