A chaotic maps-based authenticated key agreement protocol with strong anonymity

Author: Tan Zuowen  

Publisher: Springer Publishing Company

ISSN: 0924-090X

Source: Nonlinear Dynamics, Vol.72, Iss.1-2, 2013-04, pp. : 311-320

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract

In wireless communication environments, the authenticated key agreement with user anonymity is important. Recently, many chaotic maps-based anonymous authenticated key agreement protocols have been proposed. Tseng et al. applied Chebyshev chaotic maps to propose an anonymous key agreement protocol. Unfortunately, Niu et al. demonstrated that Tseng et al.'s protocol cannot protect the user anonymity and it suffers from insider attacks. Xue et al. improved Tseng et al.'s protocol. However, we have found that their improved protocol still cannot provide strong anonymity and it is vulnerable to the man-in-the-middle attack. To remove these weaknesses, we have proposed a novel chaotic maps-based authenticated key agreement protocol. The proposed protocol cannot only resist these attacks, but also provide strong anonymity.