

Author: Tan Zuowen
Publisher: Springer Publishing Company
ISSN: 0924-090X
Source: Nonlinear Dynamics, Vol.72, Iss.1-2, 2013-04, pp. : 311-320
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
In wireless communication environments, the authenticated key agreement with user anonymity is important. Recently, many chaotic maps-based anonymous authenticated key agreement protocols have been proposed. Tseng et al. applied Chebyshev chaotic maps to propose an anonymous key agreement protocol. Unfortunately, Niu et al. demonstrated that Tseng et al.'s protocol cannot protect the user anonymity and it suffers from insider attacks. Xue et al. improved Tseng et al.'s protocol. However, we have found that their improved protocol still cannot provide strong anonymity and it is vulnerable to the man-in-the-middle attack. To remove these weaknesses, we have proposed a novel chaotic maps-based authenticated key agreement protocol. The proposed protocol cannot only resist these attacks, but also provide strong anonymity.
Related content







