Security weaknesses on a delegation-based authentication protocol for PCSs

Prosanta Gope, Tzonelih Hwang

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Abstract

Rapid development of wireless networks brings about many security problems in Portable Communication Systems (PCS), which can provide mobile users with an opportunity to enjoy global roaming services. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, C-C Lee et al. proposed such scheme, which is claimed to be an improvement of T. F. Lee et al.’s protocol. However, in this article, we reveal that the scheme proposed by C-C Lee et al. still suffers from certain weaknesses like vulnerability to DoS attack, no perfect forward secrecy, loss of untraceability, etc. Hence, C-C Lee et al.’s delegation-based protocol cannot guarantee secure communication for PCS environment.

Original languageEnglish
Pages (from-to)329-333
Number of pages5
JournalInformation Technology and Control
Volume44
Issue number3
DOIs
Publication statusPublished - 2015 Sept 28

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Security weaknesses on a delegation-based authentication protocol for PCSs'. Together they form a unique fingerprint.

Cite this