Security weaknesses on a delegation-based authentication protocol for PCSs

Prosanta Gope, Tzone-Lih Hwang

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

Rapid development of wireless networks brings about many security problems in Portable Communication Systems (PCS), which can provide mobile users with an opportunity to enjoy global roaming services. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, C-C Lee et al. proposed such scheme, which is claimed to be an improvement of T. F. Lee et al.’s protocol. However, in this article, we reveal that the scheme proposed by C-C Lee et al. still suffers from certain weaknesses like vulnerability to DoS attack, no perfect forward secrecy, loss of untraceability, etc. Hence, C-C Lee et al.’s delegation-based protocol cannot guarantee secure communication for PCS environment.

Original languageEnglish
Pages (from-to)329-333
Number of pages5
JournalInformation Technology and Control
Volume44
Issue number3
DOIs
Publication statusPublished - 2015 Sep 28

Fingerprint

Authentication
Communication systems
Network protocols
Wireless networks
Secure communication
Denial-of-service attack

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

@article{182d14dcb8d14a15a06b7a587a44ee75,
title = "Security weaknesses on a delegation-based authentication protocol for PCSs",
abstract = "Rapid development of wireless networks brings about many security problems in Portable Communication Systems (PCS), which can provide mobile users with an opportunity to enjoy global roaming services. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, C-C Lee et al. proposed such scheme, which is claimed to be an improvement of T. F. Lee et al.’s protocol. However, in this article, we reveal that the scheme proposed by C-C Lee et al. still suffers from certain weaknesses like vulnerability to DoS attack, no perfect forward secrecy, loss of untraceability, etc. Hence, C-C Lee et al.’s delegation-based protocol cannot guarantee secure communication for PCS environment.",
author = "Prosanta Gope and Tzone-Lih Hwang",
year = "2015",
month = "9",
day = "28",
doi = "10.5755/j01.itc.44.3.9777",
language = "English",
volume = "44",
pages = "329--333",
journal = "Information Technology and Control",
issn = "1392-124X",
publisher = "Kauno Technologijos Universitetas",
number = "3",

}

Security weaknesses on a delegation-based authentication protocol for PCSs. / Gope, Prosanta; Hwang, Tzone-Lih.

In: Information Technology and Control, Vol. 44, No. 3, 28.09.2015, p. 329-333.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Security weaknesses on a delegation-based authentication protocol for PCSs

AU - Gope, Prosanta

AU - Hwang, Tzone-Lih

PY - 2015/9/28

Y1 - 2015/9/28

N2 - Rapid development of wireless networks brings about many security problems in Portable Communication Systems (PCS), which can provide mobile users with an opportunity to enjoy global roaming services. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, C-C Lee et al. proposed such scheme, which is claimed to be an improvement of T. F. Lee et al.’s protocol. However, in this article, we reveal that the scheme proposed by C-C Lee et al. still suffers from certain weaknesses like vulnerability to DoS attack, no perfect forward secrecy, loss of untraceability, etc. Hence, C-C Lee et al.’s delegation-based protocol cannot guarantee secure communication for PCS environment.

AB - Rapid development of wireless networks brings about many security problems in Portable Communication Systems (PCS), which can provide mobile users with an opportunity to enjoy global roaming services. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, C-C Lee et al. proposed such scheme, which is claimed to be an improvement of T. F. Lee et al.’s protocol. However, in this article, we reveal that the scheme proposed by C-C Lee et al. still suffers from certain weaknesses like vulnerability to DoS attack, no perfect forward secrecy, loss of untraceability, etc. Hence, C-C Lee et al.’s delegation-based protocol cannot guarantee secure communication for PCS environment.

UR - http://www.scopus.com/inward/record.url?scp=84942432681&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84942432681&partnerID=8YFLogxK

U2 - 10.5755/j01.itc.44.3.9777

DO - 10.5755/j01.itc.44.3.9777

M3 - Article

AN - SCOPUS:84942432681

VL - 44

SP - 329

EP - 333

JO - Information Technology and Control

JF - Information Technology and Control

SN - 1392-124X

IS - 3

ER -