A secure id-based user identification scheme for wireless environments

Chien Lung Hsu*

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

3 Scopus citations

Abstract

Hwang et al. recently proposed an efficient user identification schemebased on identity-based, (ID-based) cryptosystem, for wireless environments. InHwang et al.'s scheme, the mobile device can prove his legitimacy to a, basestation for gaining the access privilege. The mobile device and, the basestation check the legitimacy of their identities. This paper, however, will showthat Hwang et al. 's scheme is vulnerable to the impersonation attack. That is,the adversary can successfully use the intercepted, message to masquerade as a,legal mobile device to cheat the intended, base station. We further propose asecure ID-based user identification scheme against the pointed impersonationattack for wireless environments. Performance of the proposed scheme is moreefficient than that of Hwang et al. 's scheme. ICIC International

Original languageEnglish
Pages (from-to)629-633
Number of pages5
JournalICIC Express Letters
Volume4
Issue number3
StatePublished - 06 2010
Externally publishedYes

Keywords

  • Identity-based
  • Impersonation attack
  • User identification
  • Wireless

Fingerprint

Dive into the research topics of 'A secure id-based user identification scheme for wireless environments'. Together they form a unique fingerprint.

Cite this