Security flaws and improvement to a wireless authentication protocol with anonymity

The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. The anonymous security of the improved protocol was analyz...

Full description

Saved in:
Bibliographic Details
Main Authors: PENG Hua-xi, FENG Deng-guo
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2006-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74659916/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537368718311424
author PENG Hua-xi
FENG Deng-guo
author_facet PENG Hua-xi
FENG Deng-guo
author_sort PENG Hua-xi
collection DOAJ
description The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. The anonymous security of the improved protocol was analyzed in a formal way. The research results reveal that the improvement can not only achieve authentication but also have a good anonymous property and achieve the ideal security requirements of anonymity for wireless network.
format Article
id doaj-art-070bb5833b2e4020ba2853b2216a2421
institution Kabale University
issn 1000-436X
language zho
publishDate 2006-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-070bb5833b2e4020ba2853b2216a24212025-01-14T08:37:36ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2006-01-01788574659916Security flaws and improvement to a wireless authentication protocol with anonymityPENG Hua-xiFENG Deng-guoThe anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. The anonymous security of the improved protocol was analyzed in a formal way. The research results reveal that the improvement can not only achieve authentication but also have a good anonymous property and achieve the ideal security requirements of anonymity for wireless network.http://www.joconline.com.cn/zh/article/74659916/authenticationanonymitysecurity analysis
spellingShingle PENG Hua-xi
FENG Deng-guo
Security flaws and improvement to a wireless authentication protocol with anonymity
Tongxin xuebao
authentication
anonymity
security analysis
title Security flaws and improvement to a wireless authentication protocol with anonymity
title_full Security flaws and improvement to a wireless authentication protocol with anonymity
title_fullStr Security flaws and improvement to a wireless authentication protocol with anonymity
title_full_unstemmed Security flaws and improvement to a wireless authentication protocol with anonymity
title_short Security flaws and improvement to a wireless authentication protocol with anonymity
title_sort security flaws and improvement to a wireless authentication protocol with anonymity
topic authentication
anonymity
security analysis
url http://www.joconline.com.cn/zh/article/74659916/
work_keys_str_mv AT penghuaxi securityflawsandimprovementtoawirelessauthenticationprotocolwithanonymity
AT fengdengguo securityflawsandimprovementtoawirelessauthenticationprotocolwithanonymity