Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs
Authors
- Prosanta GopeDepartment of Computer Science and Information Engineering
- Tzonelih HwangNational Cheng Kung University
DOI:
https://doi.org/10.5755/j01.itc.44.3.9777Keywords:
Delegation-based authentication, DoS attack, UntraceabilityAbstract
Rapid development of wireless networks brings about many security problems in Portable Communication Systems (PCS), which can provide mobile users with an opportunity to enjoy global roaming services. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, C-C Lee et al. proposed such scheme, which is claimed to be an improvement of T. F. Lee et al.’s protocol. However, in this article, we reveal that the scheme proposed by C-C Lee et al. still suffers from certain weaknesses like vulnerable to DoS attack, no perfect forward secrecy, loss of Untraceability, etc. Hence, C-C Lee et al.’s delegation-based protocol cannot guarantee secure communication for PCS environment.
Author Biographies
Prosanta Gope,Department of Computer Science and Information Engineering
Department of Computer Science and Information Engineering
Tzonelih Hwang,National Cheng Kung University
Downloads
Published
Issue
Section
License
Copyright terms are indicated in the Republic of Lithuania Law on Copyright and Related Rights, Articles 4-37.