Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps

Authors

  • Wen Chung Kuo National Yunlin University of Science and Technology
  • Chi-Sheng Lin
  • Chen-Tsun Chuang
  • Ming-Chih Kao

DOI:

https://doi.org/10.5755/j01.itc.45.2.8875

Keywords:

Authentication, mutual authentication, chaotic-maps, security

Abstract

Wireless network authentication schemes have been researched forabout a decade, and associated security problems explored by manyresearchers. In 2004, Zhu and Ma proposed an authentication schemefor wireless environments. Afterwards other researchers proposedimprovements according to Zhu-Ma scheme. Mutual authentication isone of the most important issues. To the best of our knowledge,there is no scheme that allows a foreign agent to authenticate thehome agent and mobile user at the same time. Towards this purpose,we propose a simultaneous authentication scheme based on chaoticmaps, and describe how our proposed scheme addresses varioussecurity problems while maintain anonymity.

DOI: http://dx.doi.org/10.5755/j01.itc.45.2.8875

Downloads

Published

2016-06-27

Issue

Section

Regular Papers