A practical authentication protocol with anonymity for wireless access networks

Yen Cheng Chen, Shu Chuan Chuang, Lo Yao Yeh, Jiun Long Huang

Research output: Contribution to journalArticlepeer-review

24 Scopus citations


The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications. Recently, Yang et al. proposed a secure and efficient authentication protocol for anonymous channel in wireless systems without employing asymmetric cryptosystems. In this paper, we will show that Yang et al.'s scheme is vulnerable to guessing attacks performed by malicious visited networks, which can easily obtain the secret keys of the users. We propose a new practical authentication scheme not only reserving the merits of Yang et al.'s scheme, but also extending some additional merits including: no verification table in the home network, free of time synchronization between mobile stations and visited networks, and without obsolete anonymous tickets left in visited networks. The proposed scheme is developed based on a secure one-way hash function and simple operations, a feature which is extremely fit for mobile devices. We provide the soundness of the authentication protocol by using VO logic.

Original languageEnglish
Pages (from-to)1366-1375
Number of pages10
JournalWireless Communications and Mobile Computing
Issue number10
StatePublished - Oct 2011


  • VO logic
  • authentication
  • security
  • user anonymity
  • wireless network


Dive into the research topics of 'A practical authentication protocol with anonymity for wireless access networks'. Together they form a unique fingerprint.

Cite this