Journal of Engineering and Applied Sciences
Year:
2019
Volume:
14
Issue:
19
Page No.
7013 - 7019
Weaknesses of Anonymous Mutual Authentication Schemes for
Roaming Service with Smart Cards
Authors :
YounsungChoi
References
Choi, Y., D. Lee, J. Kim, J. Jung, and J. Nam
et al., 2014. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sens., 14: 10081-10106.
CrossRef | Direct Link | Choi, Y., J. Nam, D. Lee, J. Kim and J. Jung
et al., 2014. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics. Sci World J., 2014: 1-15.
PubMed | Direct Link | Guo, C., C.C. Chang and C.Y. Sun, 2013. Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications. J. Inf. Hiding Multimedia Signal Proc., 4: 99-109.
Direct Link | He, D., M. Ma, Y. Zhang, C. Chen and J. Bu, 2010. A strong user authentication scheme with smart cards for wireless communications. Comput. Commun., 34: 367-374.
Direct Link | Jerabek, E., 2016. Integer factoring and modular square roots. J. Comput. Syst. Sci., 82: 380-394.
CrossRef | Direct Link | Jung, J., J. Kim, Y. Choi and D. Won, 2016. An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sens., 16: 1-30.
CrossRef | PubMed | Direct Link | Kang, D., J. Jung, J. Mun, D. Lee and Y. Choi
et al., 2016. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Netw., 9: 1462-1476.
CrossRef | Direct Link | Lee, C.C., M.S. Hwang and I.E. Liao, 2006. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE. Trans. Ind. Electron., 53: 1683-1687.
CrossRef | Direct Link | Liu, C.S., L. Xu, L. Lin, M.C. Tseng and S.Y. Lin
et al., 2016. Mutual authentication with anonymity for roaming service with smart cards in wireless communications. Proceedings of the International Conference on Network and System Security, September 28-30, 2016, Springer, Cham, Switzerland, ISBN:978-3-319-46297-4, pp: 47-61.
Ma, C.G., D. Wang and S.D. Zhao, 2014. Security flaws in two improved remote user authentication schemes using smart cards. Intl. J. Commun. Syst., 27: 2215-2227.
CrossRef | PubMed | Direct Link | Mun, J., J. Kim, D. Lee, J. Jung and Y. Choi
et al., 2015. An improvement of efficient dynamic ID-based user authentication scheme using smart cards without verifier tables. Proceedings of the International Conference on Security and Management (SAM'15) and the Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), July 27-30, 2015, Las Vegas, Nevada, pp: 152-156.
Rabin, M.O., 1979. Digitalized signatures and public-key functions as intractable as factorization. Master Thesis, Massachusetts Institute of Technology Cambridge, Massachusetts USA.
Sui, A.F., L.C.K. Hui, S.M. Yiu, K.P. Chow and W.W. Tsang
et al., 2005. An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. Proceedings of the IEEE International Conference on Wireless Communications and Networking Vol. 4, March 13-17, 2005, IEEE, New Orleans, Louisiana, USA., pp: 2088-2093.
Williams, H., 1980. A modification of the RSA public-key encryption procedure (Corresp.). IEEE. Trans. Inf. Theory, 26: 726-729.
CrossRef | Direct Link | Xu, J., W.T. Zhu and D.G. Feng, 2011. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun., 34: 319-325.
CrossRef | Direct Link |