Get access

A novel user authentication scheme with anonymity for wireless communications

Authors

  • Jianwei Niu,

    Corresponding author
    1. State Key Laboratory of Software Development Environment, Beihang University, Beijing, China
    • Correspondence: Jianwei Niu, State Key Laboratory of Software Development Environment, Beihang University, Beijing 100191, China. E-mail: niujianwei@buaa.edu.cn

    Search for more papers by this author
  • Xiong Li

    1. School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China
    2. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
    Search for more papers by this author

ABSTRACT

User authentication and privacy protection are important issues for wireless and mobile communication systems such as GSM, 3G, and 4G wireless networks. Recently, Yoon et al. proposed a user-friendly authentication scheme with anonymity for wireless communications. However, in this paper, we show that user anonymity of their scheme is not achieved under the eavesdropping attack and their scheme is not fair in the key agreement. In order to ensure security authentication and protect user anonymity for wireless communications, we propose a novel user authentication scheme with anonymity based on elliptic curve cryptosystem, which can resist various known types of attacks and is more practical for wireless and mobile communications. Copyright © 2012 John Wiley & Sons, Ltd.

Ancillary