6 research outputs found

    Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Get PDF
    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme

    A lightweight and secure multilayer authentication scheme for wireless body area networks in healthcare system

    Get PDF
    Wireless body area networks (WBANs) have lately been combined with different healthcare equipment to monitor patients' health status and communicate information with their healthcare practitioners. Since healthcare data often contain personal and sensitive information, it is important that healthcare systems have a secure way for users to log in and access resources and services. The lack of security and presence of anonymous communication in WBANs can cause their operational failure. There are other systems in this area, but they are vulnerable to offline identity guessing attacks, impersonation attacks in sensor nodes, and spoofing attacks in hub node. Therefore, this study provides a secure approach that overcomes these issues while maintaining comparable efficiency in wireless sensor nodes and mobile phones. To conduct the proof of security, the proposed scheme uses the Scyther tool for formal analysis and the Canetti–Krawczyk (CK) model for informal analysis. Furthermore, the suggested technique outperforms the existing symmetric and asymmetric encryption-based schemes

    Security enhancement on a new authentication scheme with anonymity for wireless environments

    No full text
    In a paper recently published in the IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma's scheme has some security weaknesses. Therefore, in this paper, a slight modification to their scheme is proposed to improve their shortcomings. As a result, the scheme proposed in this paper can enhance the security of Zhu and Ma's scheme. Finally, the performance of this scheme is analyzed. Compared with the Zhu-Ma scheme, this scheme is also simple and efficient

    Security Enhancement on A New Authentication Scheme with Anonymity for Wireless Environments

    No full text
    [[abstract]]In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma's scheme has some security weaknesses. Therefore, in this paper, a slight modification to their scheme is proposed to improve their shortcomings. As a result, the scheme proposed in this paper can enhance the security of Zhu and Ma's scheme. Finally, the performance of this scheme is analyzed. Compared with the Zhu-Ma scheme, this scheme is also simple and efficien

    Security Enhancement on A New Authentication Scheme with Anonymity for Wireless Environments

    No full text
    [[abstract]]In a paper recently published in the IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma’s scheme has some security weaknesses. Therefore, in this paper, a slight modifi-cation to their scheme is proposed to improve their shortcomings.As a result, the scheme proposed in this paper can enhance the security of Zhu and Ma’s scheme. Finally, the performance of this scheme is analyzed. Compared with the Zhu–Ma scheme, this scheme is also simple and efficient
    corecore