Abstract

In wireless environments, the issue of mutual authentication and key agreement with user anonimity is challenging. Recently, Mun et al. proposed an efficient anonymous authentication scheme for roaming services in wireless enviroments. Unfortunately, Kim et al. pointed out that Mun et al.’s anonymous authentication scheme suffers from replay attacks and man-in-the-middle attacks. They propose an improved secure anonymous authentication scheme for roaming services. Kim et al. claimed that their protocol removed the weaknesses of the Mun et al.’s scheme. However, we show that Kim et al.'s scheme fails to achieve anonymity. In addition, Kim et al.'s scheme is vulnerable to replay attacks and impersonation attacks and is impractical in the real-life implementation. We then propose an enhanced privacy-preserving authentication scheme. We demonstrate that our scheme overcomes the aforementioned weaknesses.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call