Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Security flaw of authentication scheme with anonymity for wireless communications
IEEE Communications Letters
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
Wireless Personal Communications: An International Journal
International Journal of Network Management
Security enhanced user authentication scheme for wireless sensor network
International Journal of Electronic Security and Digital Forensics
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Recently, Chang, Lee, and Chiu proposed an enhanced anonymous authentication scheme which permits mobile users to anonymously enjoy roaming service in global mobile networks. In this letter, we show that their scheme fails to achieve the anonymity by providing four attack strategies. Moreover, we show that anyone can recover a mobile user's session keys by using the identity of the mobile user. Hence, Chang et al.'s scheme cannot provide secure key establishing service since an adversary can recover the identity of a mobile user by performing one of our attacks.