Loading…
Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments
In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma's scheme has some security weaknesses. Therefore, in this paper, a slight modificat...
Saved in:
Published in: | IEEE transactions on industrial electronics (1982) 2006-10, Vol.53 (5), p.1683-1687 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c320t-1622f46edc9ffc644bbf2618119c1c9b4405afc75db5b0a4e3ad7f47a4969fe23 |
---|---|
cites | cdi_FETCH-LOGICAL-c320t-1622f46edc9ffc644bbf2618119c1c9b4405afc75db5b0a4e3ad7f47a4969fe23 |
container_end_page | 1687 |
container_issue | 5 |
container_start_page | 1683 |
container_title | IEEE transactions on industrial electronics (1982) |
container_volume | 53 |
creator | Lee, C.-C. Hwang, M.-S. Liao, I.-E. |
description | In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma's scheme has some security weaknesses. Therefore, in this paper, a slight modification to their scheme is proposed to improve their shortcomings. As a result, the scheme proposed in this paper can enhance the security of Zhu and Ma's scheme. Finally, the performance of this scheme is analyzed. Compared with the Zhu-Ma scheme, this scheme is also simple and efficient |
doi_str_mv | 10.1109/TIE.2006.881998 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIE_2006_881998</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1705661</ieee_id><sourcerecordid>2342629551</sourcerecordid><originalsourceid>FETCH-LOGICAL-c320t-1622f46edc9ffc644bbf2618119c1c9b4405afc75db5b0a4e3ad7f47a4969fe23</originalsourceid><addsrcrecordid>eNpdkEFLwzAYhoMoOKdnD16KF0_dkjZJk-MYUwdDD5t4EUKafaEdWzqTVtm_N6WC4OmDl-d9-XgQuiV4QgiW081yMckw5hMhiJTiDI0IY0UqJRXnaISzQqQYU36JrkLYYUwoI2yEPtZgOl-3p2ThKu0MHMC1SeMSnbzAdzLr2ioGtdFtHcO1qSKQvNdtlcxc406HvmkbHyMPewghznzVvnH9TLhGF1bvA9z83jF6e1xs5s_p6vVpOZ-tUpNnuE0JzzJLOWyNtNZwSsvSZpwIQqQhRpaUYqatKdi2ZCXWFHK9LSwtNJVcWsjyMXoYdo---ewgtOpQBwP7vXbQdEEJyYnMJRaRvP9H7prOu_icEpzxQogsj9B0gIxvQvBg1dHXB-1PimDVu1bRtepdq8F1bNwNjRoA_ugCM85J_gN0jXtO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>865678823</pqid></control><display><type>article</type><title>Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments</title><source>IEEE Xplore (Online service)</source><creator>Lee, C.-C. ; Hwang, M.-S. ; Liao, I.-E.</creator><creatorcontrib>Lee, C.-C. ; Hwang, M.-S. ; Liao, I.-E.</creatorcontrib><description>In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma's scheme has some security weaknesses. Therefore, in this paper, a slight modification to their scheme is proposed to improve their shortcomings. As a result, the scheme proposed in this paper can enhance the security of Zhu and Ma's scheme. Finally, the performance of this scheme is analyzed. Compared with the Zhu-Ma scheme, this scheme is also simple and efficient</description><identifier>ISSN: 0278-0046</identifier><identifier>EISSN: 1557-9948</identifier><identifier>DOI: 10.1109/TIE.2006.881998</identifier><identifier>CODEN: ITIED6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Anonymity ; Authentication ; Communication system security ; Computer science ; Consumer electronics ; Electronics ; Industrial electronics ; Information security ; Performance analysis ; Privacy ; Security ; Smart cards ; Wireless communication ; wireless network ; Wireless networks</subject><ispartof>IEEE transactions on industrial electronics (1982), 2006-10, Vol.53 (5), p.1683-1687</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2006</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c320t-1622f46edc9ffc644bbf2618119c1c9b4405afc75db5b0a4e3ad7f47a4969fe23</citedby><cites>FETCH-LOGICAL-c320t-1622f46edc9ffc644bbf2618119c1c9b4405afc75db5b0a4e3ad7f47a4969fe23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1705661$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Lee, C.-C.</creatorcontrib><creatorcontrib>Hwang, M.-S.</creatorcontrib><creatorcontrib>Liao, I.-E.</creatorcontrib><title>Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments</title><title>IEEE transactions on industrial electronics (1982)</title><addtitle>TIE</addtitle><description>In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma's scheme has some security weaknesses. Therefore, in this paper, a slight modification to their scheme is proposed to improve their shortcomings. As a result, the scheme proposed in this paper can enhance the security of Zhu and Ma's scheme. Finally, the performance of this scheme is analyzed. Compared with the Zhu-Ma scheme, this scheme is also simple and efficient</description><subject>Anonymity</subject><subject>Authentication</subject><subject>Communication system security</subject><subject>Computer science</subject><subject>Consumer electronics</subject><subject>Electronics</subject><subject>Industrial electronics</subject><subject>Information security</subject><subject>Performance analysis</subject><subject>Privacy</subject><subject>Security</subject><subject>Smart cards</subject><subject>Wireless communication</subject><subject>wireless network</subject><subject>Wireless networks</subject><issn>0278-0046</issn><issn>1557-9948</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><recordid>eNpdkEFLwzAYhoMoOKdnD16KF0_dkjZJk-MYUwdDD5t4EUKafaEdWzqTVtm_N6WC4OmDl-d9-XgQuiV4QgiW081yMckw5hMhiJTiDI0IY0UqJRXnaISzQqQYU36JrkLYYUwoI2yEPtZgOl-3p2ThKu0MHMC1SeMSnbzAdzLr2ioGtdFtHcO1qSKQvNdtlcxc406HvmkbHyMPewghznzVvnH9TLhGF1bvA9z83jF6e1xs5s_p6vVpOZ-tUpNnuE0JzzJLOWyNtNZwSsvSZpwIQqQhRpaUYqatKdi2ZCXWFHK9LSwtNJVcWsjyMXoYdo---ewgtOpQBwP7vXbQdEEJyYnMJRaRvP9H7prOu_icEpzxQogsj9B0gIxvQvBg1dHXB-1PimDVu1bRtepdq8F1bNwNjRoA_ugCM85J_gN0jXtO</recordid><startdate>20061001</startdate><enddate>20061001</enddate><creator>Lee, C.-C.</creator><creator>Hwang, M.-S.</creator><creator>Liao, I.-E.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20061001</creationdate><title>Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments</title><author>Lee, C.-C. ; Hwang, M.-S. ; Liao, I.-E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c320t-1622f46edc9ffc644bbf2618119c1c9b4405afc75db5b0a4e3ad7f47a4969fe23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Anonymity</topic><topic>Authentication</topic><topic>Communication system security</topic><topic>Computer science</topic><topic>Consumer electronics</topic><topic>Electronics</topic><topic>Industrial electronics</topic><topic>Information security</topic><topic>Performance analysis</topic><topic>Privacy</topic><topic>Security</topic><topic>Smart cards</topic><topic>Wireless communication</topic><topic>wireless network</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lee, C.-C.</creatorcontrib><creatorcontrib>Hwang, M.-S.</creatorcontrib><creatorcontrib>Liao, I.-E.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Electronic Library Online</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on industrial electronics (1982)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lee, C.-C.</au><au>Hwang, M.-S.</au><au>Liao, I.-E.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments</atitle><jtitle>IEEE transactions on industrial electronics (1982)</jtitle><stitle>TIE</stitle><date>2006-10-01</date><risdate>2006</risdate><volume>53</volume><issue>5</issue><spage>1683</spage><epage>1687</epage><pages>1683-1687</pages><issn>0278-0046</issn><eissn>1557-9948</eissn><coden>ITIED6</coden><abstract>In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma's scheme has some security weaknesses. Therefore, in this paper, a slight modification to their scheme is proposed to improve their shortcomings. As a result, the scheme proposed in this paper can enhance the security of Zhu and Ma's scheme. Finally, the performance of this scheme is analyzed. Compared with the Zhu-Ma scheme, this scheme is also simple and efficient</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIE.2006.881998</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0278-0046 |
ispartof | IEEE transactions on industrial electronics (1982), 2006-10, Vol.53 (5), p.1683-1687 |
issn | 0278-0046 1557-9948 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TIE_2006_881998 |
source | IEEE Xplore (Online service) |
subjects | Anonymity Authentication Communication system security Computer science Consumer electronics Electronics Industrial electronics Information security Performance analysis Privacy Security Smart cards Wireless communication wireless network Wireless networks |
title | Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T22%3A59%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Enhancement%20on%20a%20New%20Authentication%20Scheme%20With%20Anonymity%20for%20Wireless%20Environments&rft.jtitle=IEEE%20transactions%20on%20industrial%20electronics%20(1982)&rft.au=Lee,%20C.-C.&rft.date=2006-10-01&rft.volume=53&rft.issue=5&rft.spage=1683&rft.epage=1687&rft.pages=1683-1687&rft.issn=0278-0046&rft.eissn=1557-9948&rft.coden=ITIED6&rft_id=info:doi/10.1109/TIE.2006.881998&rft_dat=%3Cproquest_cross%3E2342629551%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c320t-1622f46edc9ffc644bbf2618119c1c9b4405afc75db5b0a4e3ad7f47a4969fe23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=865678823&rft_id=info:pmid/&rft_ieee_id=1705661&rfr_iscdi=true |