Abstract
Hwang et al. recently proposed an efficient user identification schemebased on identity-based, (ID-based) cryptosystem, for wireless environments. InHwang et al.'s scheme, the mobile device can prove his legitimacy to a, basestation for gaining the access privilege. The mobile device and, the basestation check the legitimacy of their identities. This paper, however, will showthat Hwang et al. 's scheme is vulnerable to the impersonation attack. That is,the adversary can successfully use the intercepted, message to masquerade as a,legal mobile device to cheat the intended, base station. We further propose asecure ID-based user identification scheme against the pointed impersonationattack for wireless environments. Performance of the proposed scheme is moreefficient than that of Hwang et al. 's scheme. ICIC International
Original language | English |
---|---|
Pages (from-to) | 629-633 |
Number of pages | 5 |
Journal | ICIC Express Letters |
Volume | 4 |
Issue number | 3 |
State | Published - 06 2010 |
Externally published | Yes |
Keywords
- Identity-based
- Impersonation attack
- User identification
- Wireless