A new authentication scheme with anonymity for wireless environments
- 28 June 2004
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Consumer Electronics
- Vol. 50 (1), 231-235
- https://doi.org/10.1109/tce.2004.1277867
Abstract
Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is somewhat more concentrated and complex than that of wired network. Authentication is the most essential procedure to ensure that the service is properly used. But its limited resource, such as weak power supplies and limited bandwidth, must be taken into account in the design of security schemes. In this paper, we present a new and efficient wireless authentication protocol providing user anonymity. Our scheme is based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. Finally, the performance of our scheme is analyzed.Keywords
This publication has 6 references indexed in Scilit:
- Security architecture for wireless residential networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Security in Wireless CommunicationWireless Personal Communications, 2002
- Authentication of Mobile Users in Third Generation Mobile SystemsWireless Personal Communications, 2001
- Survivable mobile phone network architectures: models and solution methodsIEEE Communications Magazine, 1998
- Improving the fault tolerance of GSM networksIEEE Network, 1998
- Authentication and payment in future mobile systemsPublished by Springer Nature ,1998