Article,

A new authentication scheme with anonymity for wireless environments

, and .
Consumer Electronics, IEEE Transactions on, 50 (1): 231--235 (2004)
DOI: 10.1109/TCE.2004.1277867

Abstract

Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is somewhat more concentrated and complex than that of wired network. Authentication is the most essential procedure to ensure that the service is properly used. But its limited resource, such as weak power supplies and limited bandwidth, must be taken into account in the design of security schemes. In this paper, we present a new and efficient wireless authentication protocol providing user anonymity. Our scheme is based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. Finally, the performance of our scheme is analyzed.

Tags

Users

  • @earthfare
  • @dblp

Comments and Reviewsshow / hide

  • anonymous
    13 years ago
    i want to download this paper please
Please log in to take part in the discussion (add own reviews or comments).