Abstract
In wireless communication system, a good protocol should satisfy many requirements: user identity authentication, privacy protection, computational efficiency and resist some known attacks. Thus design a highly secure anonymous authentication protocols for wireless networks is a challenging task. Over recent years, many researchers have proposed their own solutions to address this issue. In 2014, Niu et al. analyzed Yoon et al.’s authentication scheme, then put forward a smart card based authentication scheme with anonymity for wireless networks. They claimed their scheme achieves many security requirements and resists some known threats. Nevertheless, after detailed analysis, we prove that the scheme of Niu et al. is prone to some malicious attacks such as replay attacks and DoS attacks. Moreover, the scheme does not work when large amount of mobile users access a foreign agent simultaneously. To overcome these drawbacks, we present a new secure authentication scheme with user anonymity by improving Niu et al.’s scheme. The proposed protocol not only satisfies many security properties, such as strong anonymity, mutual authentication and periodically update session key, but also resists well-known threats. Furthermore, the security and performance analyses indicates that the new scheme is well suitable for wireless communications when it is compared with previous protocols.






Similar content being viewed by others
References
Hsiang, H.-C., & Shih, W.-K. (2009). Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118–1123.
Chang, C.-C., Lee, C.-Y., & Chiu, Y.-C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(8), 611–618.
He, D., Mab, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(8), 367–374.
Das, A. K. (2013). A secure and effective user authentication and privacypreserving protocol with smart cards for wireless communications. Networking Science, 2, 12–27.
Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 51(21), 230–234.
Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.
Wu, C.-C., Lee, W.-B., & Tsaur, W.-J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(2), 722–723.
Li, C.-T., & Lee, C.-C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Elsevier, 55, 35–44.
Niu, J., & Li, X. (2014). A novel user authentication scheme with anonymity for wireless communications. Security and Communication Networks, 7(7), 1467–1476.
Yoon, E.-J., Yoo, K.-Y., & Ha, K.-S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers and Electrical Engineering, 37, 356–364.
Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78, 247–269. 7.
Kang, M., Rhee, H. S., & Choi, J. Y. (2011). Improved user authentication scheme with user anonymity for wireless communications. Ieice Trans Fundamentals, 94(2), 860–864.
Hu, B., Xie, Q., Bao, M., & Dong, N. (2014). Improvement of user authentication protocol with anonymity for wireless communications. Kuwait Journal of Science, 41(1), 155–169.
Wen, F., Susilo, W., & Yang, G. (2014). A robust smart cardbased anonymous user authentication protocol for wireless communications. Security & Communication Networks, 7(6), 987–993.
Farash, M. S., Chaudhry, S. A., Heydari, M., Sadough, S. M. S., Kumari, S., & Khan, M. K. (2015). A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems. doi:10.1002/dac.3019.
Shin, S., Yeh, H., & Kim, K. (2015). An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Networking and Applications, 8(4), 1–10.
Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 73(3), 993–1004.
Chung, Y., Choi, S., Lee, Y., Park, N., & Won, D. (2016). An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653.
Djellali, B., Belarbi, K., Chouarfia, A., & Lorenz, P. (2015). User authentication scheme preserving anonymity for ubiquitous devices. Security & Communication Networks, 8(17), 3131–3141.
Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 72(10), 3826–3849.
Xiong, H., Wang, X., & Li, F. (2012). Security flaw of an improved user authentication scheme with user anonymity for wireless communications. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences, 95-A, 256–258.
Kang, D., Mun, J., Lee, D., & Won, D. (2015). Cryptanalysis of user authentication scheme preserving anonymity for ubiquitous devices. In: D. S. Park, H. C. Chao, Y. S. Jeong, & J. Park (Eds.), Advances in Computer Science and Ubiquitous Computing, Lecture Notes in Electrical Engineering. (Vol. 373, pp. 309–315)
Irshad, A., & Chaudhry, S. A. (2016). Comments on a privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 4(73), 1504–1508.
Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. Berlin: Springer.
Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In: M. Wiener (Ed.), Advances in Cryptology (CRYPTO'99), Lecture Notes in Computer Science (Vol. 166, pp. 388–397). Heidelberg: Springer.
Ts, M., Ea, D., & Rh, S. (2002). Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.
Needham, R. M. (1993). Denial of service. In Proceedings of the 1st ACM conference on computer and communications security, series CCS ’93 (pp. 151–153). New York, NY, USA: ACM. http://doi.acm.org/10.1145/168588.168607
Eastlake 3rd, D., & Jones, P. (2001). US Secure Hash Algorithm 1 (SHA1), RFC 3174. doi:10.17487/RFC3174.
Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.
Buchmann, J. (2004). Introduction to cryptography (2nd ed.). New York: Springer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, R., Peng, D. An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications. Wireless Pers Commun 97, 2665–2682 (2017). https://doi.org/10.1007/s11277-017-4629-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4629-x