TY - GEN
T1 - Modified anonymous authentication scheme with enhanced security for wireless communication
AU - Khan, Muhammad Asif
AU - Kausar, Firdous
AU - Masood, Ashraf
PY - 2010
Y1 - 2010
N2 - Authentication is the first and most important step in provision of any secure service to the users. It is used to ensure that only authentic users be able to use that secure service.Anonymous authentication is another vital aspect in wireless secure communication. Anonymous authentication is termed as authenticating the user without disclosing his/her identity. Many authentication with anonymity schemes are propose for secure communication in wireless environment. Wireless communication technology is susceptible to many common attacks. In this paper we point out security flaws in recently proposed improved anonymous authentication schemes in wireless communication, in which the inside adversary who register as a legitimate user reveals the identity of user and thus defeat the anonymity. We propose a modified anonymous authentication scheme with enhanced security, covering the security flaws identified in recent schemes.
AB - Authentication is the first and most important step in provision of any secure service to the users. It is used to ensure that only authentic users be able to use that secure service.Anonymous authentication is another vital aspect in wireless secure communication. Anonymous authentication is termed as authenticating the user without disclosing his/her identity. Many authentication with anonymity schemes are propose for secure communication in wireless environment. Wireless communication technology is susceptible to many common attacks. In this paper we point out security flaws in recently proposed improved anonymous authentication schemes in wireless communication, in which the inside adversary who register as a legitimate user reveals the identity of user and thus defeat the anonymity. We propose a modified anonymous authentication scheme with enhanced security, covering the security flaws identified in recent schemes.
UR - http://www.scopus.com/inward/record.url?scp=77957933596&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77957933596&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-13365-7_19
DO - 10.1007/978-3-642-13365-7_19
M3 - Conference contribution
AN - SCOPUS:77957933596
SN - 3642133649
SN - 9783642133640
T3 - Communications in Computer and Information Science
SP - 198
EP - 208
BT - Information Security and Assurance - 4th International Conference, ISA 2010, Proceedings
T2 - 4th International Conference on Information Security and Assurance, ISA 2010
Y2 - 23 June 2010 through 25 June 2010
ER -