Journal
WIRELESS PERSONAL COMMUNICATIONS
Volume 83, Issue 1, Pages 35-48Publisher
SPRINGER
DOI: 10.1007/s11277-015-2378-2
Keywords
Authentication; Chaotic map; Security; Anonymous; BAN-logic
Categories
Funding
- NSFC [61300181, 61202434]
- Fundamental Research Funds for the Central Universities [2015RC23]
Ask authors/readers for more resources
In distributed networks, anonymous user authentication is crucial to enable authorized access and guard privacy. Recently, Lin proposed a chaotic map-based anonymous mobile user authentication scheme. In this paper, we analyze the security of Lin's scheme and identify that the scheme is vulnerable to impersonation attack and server masquerading attack. We then devise an improved chaotic map-based authentication scheme to assure reliability and security. Compared with the related chaotic map-based authentication schemes, our protocol employs an innovative solution which rectifies the security flaws caused by the inherent defect of Chebyshev chaotic map-based public key systems. Furthermore, BAN-logic is put forward to certify the validity of our proposal. The security and performance analysis also shows that our scheme provides stronger security and better scalability than previous related schemes.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available