Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks

Taek Young Youn, Young Ho Park, Jongin Lim

Research output: Contribution to journalArticlepeer-review

72 Citations (Scopus)

Abstract

Recently, Chang, Lee, and Chiu proposed an enhanced anonymous authentication scheme which permits mobile users to anonymously enjoy roaming service in global mobile networks. In this letter, we show that their scheme fails to achieve the anonymity by providing four attack strategies. Moreover, we show that anyone can recover a mobile user's session keys by using the identity of the mobile user. Hence, Chang et al.'s scheme cannot provide secure key establishing service since an adversary can recover the identity of a mobile user by performing one of our attacks.

Original languageEnglish
Pages (from-to)471-473
Number of pages3
JournalIEEE Communications Letters
Volume13
Issue number7
DOIs
Publication statusPublished - 2009

Keywords

  • Anonymous authentication
  • Mobile
  • Security

ASJC Scopus subject areas

  • Modelling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks'. Together they form a unique fingerprint.

Cite this