On the anonymity of some authentication schemes for wireless communications

Peng Zeng, Zhenfu Cao*, Kim Kwang Raymond Choo, Shengbao Wang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

61 Scopus citations

Abstract

In 2004, Zhu and Ma proposed a new and efficient authentication scheme claiming to provide anonymity for wireless environments. Two years later, Lee et al. revealed several previously unpublished flaws in Zhu-Ma's authentication scheme and proposed a fix. More recently in 2008, Wu et al. pointed out that Lee et al.'s proposed fix fails to preserve anonymity as claimed and then proposed yet another fix to address the problem. In this paper, we use Wu et al.'s scheme as a case study and demonstrate that due to an inherent design flaw in Zhu-Ma's scheme, the latter and its successors are unlikely to provide anonymity. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs.

Original languageEnglish
Pages (from-to)170-171
Number of pages2
JournalIEEE Communications Letters
Volume13
Issue number3
DOIs
StatePublished - 2009
Externally publishedYes

Keywords

  • Anonymity
  • Authentication
  • Wireless communications

Fingerprint

Dive into the research topics of 'On the anonymity of some authentication schemes for wireless communications'. Together they form a unique fingerprint.

Cite this