首页 | 本学科首页   官方微博 | 高级检索  
     


Security Flaws in Authentication Protocols with Anonymity for Wireless Environments
Authors:Jing Xu  Dengguo Feng
Abstract:The emerging wireless networks require the design of new authentication protocols due to their dynamic nature and vulnerable‐to‐attack structure. Recently, Wu and others proposed a wireless authentication protocol which is claimed to be an improvement of the authentication protocol proposed by Lee and others which provides user anonymity. In this letter, we show that these protocols have a common flaw and that these protocols fail to provide user anonymity. We also propose a modification method to solve this problem.
Keywords:Wireless security  roaming service  anonymity  authentication  key agreement  smart card
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号