DocumentCode :
935768
Title :
A new authentication scheme with anonymity for wireless environments
Author :
Zhu, Jianming ; Ma, Jianfeng
Author_Institution :
Sch. of Comput., Xidian Univ., Xi´´an, China
Volume :
50
Issue :
1
fYear :
2004
fDate :
2/1/2004 12:00:00 AM
Firstpage :
231
Lastpage :
235
Abstract :
Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is somewhat more concentrated and complex than that of wired network. Authentication is the most essential procedure to ensure that the service is properly used. But its limited resource, such as weak power supplies and limited bandwidth, must be taken into account in the design of security schemes. In this paper, we present a new and efficient wireless authentication protocol providing user anonymity. Our scheme is based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. Finally, the performance of our scheme is analyzed.
Keywords :
cryptography; message authentication; mobile communication; protocols; radio networks; telecommunication security; hash function; message exchange; mobile user; security attacks; smart cards; symmetric decryption; symmetric encryption; transmission media; user anonymity; wireless authentication protocol; wireless network security; Authentication; Bandwidth; Communication system security; Cryptography; Home automation; Performance analysis; Power supplies; Smart cards; Wireless application protocol; Wireless networks;
fLanguage :
English
Journal_Title :
Consumer Electronics, IEEE Transactions on
Publisher :
ieee
ISSN :
0098-3063
Type :
jour
DOI :
10.1109/TCE.2004.1277867
Filename :
1277867
Link To Document :
بازگشت