TY - JOUR
T1 - On the anonymity of some authentication schemes for wireless communications
AU - Zeng, Peng
AU - Cao, Zhenfu
AU - Choo, Kim Kwang Raymond
AU - Wang, Shengbao
PY - 2009
Y1 - 2009
N2 - In 2004, Zhu and Ma proposed a new and efficient authentication scheme claiming to provide anonymity for wireless environments. Two years later, Lee et al. revealed several previously unpublished flaws in Zhu-Ma's authentication scheme and proposed a fix. More recently in 2008, Wu et al. pointed out that Lee et al.'s proposed fix fails to preserve anonymity as claimed and then proposed yet another fix to address the problem. In this paper, we use Wu et al.'s scheme as a case study and demonstrate that due to an inherent design flaw in Zhu-Ma's scheme, the latter and its successors are unlikely to provide anonymity. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs.
AB - In 2004, Zhu and Ma proposed a new and efficient authentication scheme claiming to provide anonymity for wireless environments. Two years later, Lee et al. revealed several previously unpublished flaws in Zhu-Ma's authentication scheme and proposed a fix. More recently in 2008, Wu et al. pointed out that Lee et al.'s proposed fix fails to preserve anonymity as claimed and then proposed yet another fix to address the problem. In this paper, we use Wu et al.'s scheme as a case study and demonstrate that due to an inherent design flaw in Zhu-Ma's scheme, the latter and its successors are unlikely to provide anonymity. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs.
KW - Anonymity
KW - Authentication
KW - Wireless communications
UR - http://www.scopus.com/inward/record.url?scp=63649131787&partnerID=8YFLogxK
U2 - 10.1109/LCOMM.2009.081821
DO - 10.1109/LCOMM.2009.081821
M3 - Article
SN - 1089-7798
VL - 13
SP - 170
EP - 171
JO - IEEE Communications Letters
JF - IEEE Communications Letters
IS - 3
ER -