4.4 Article

Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'

Journal

WIRELESS PERSONAL COMMUNICATIONS
Volume 83, Issue 1, Pages 35-48

Publisher

SPRINGER
DOI: 10.1007/s11277-015-2378-2

Keywords

Authentication; Chaotic map; Security; Anonymous; BAN-logic

Funding

  1. NSFC [61300181, 61202434]
  2. Fundamental Research Funds for the Central Universities [2015RC23]

Ask authors/readers for more resources

In distributed networks, anonymous user authentication is crucial to enable authorized access and guard privacy. Recently, Lin proposed a chaotic map-based anonymous mobile user authentication scheme. In this paper, we analyze the security of Lin's scheme and identify that the scheme is vulnerable to impersonation attack and server masquerading attack. We then devise an improved chaotic map-based authentication scheme to assure reliability and security. Compared with the related chaotic map-based authentication schemes, our protocol employs an innovative solution which rectifies the security flaws caused by the inherent defect of Chebyshev chaotic map-based public key systems. Furthermore, BAN-logic is put forward to certify the validity of our proposal. The security and performance analysis also shows that our scheme provides stronger security and better scalability than previous related schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available