Computer Science ›› 2016, Vol. 43 ›› Issue (11): 205-209.doi: 10.11896/j.issn.1002-137X.2016.11.040

Previous Articles     Next Articles

Novel Two-way Security Authentication Wireless Scheme Based on Hash Function

WANG Jie-hua, LIU Hui-ping, SHAO Hao-ran and XIA Hai-yan   

  • Online:2018-12-01 Published:2018-12-01

Abstract: With the development of science and technology,more and more network devices are connected to the wireless network.In order to ensure the legitimate users’ correct identification and connections,based on the Wen-Li authentication scheme,a novel two-way security authentication wireless scheme based on hash function(TSAWSH) was proposed.By using the send packet sequence number instead of of timestamp,the TSAWSH can avoid the influence to the certification process caused by the network delay and needn’t the strict clock synchronization between the devices.By comparing the security and complexity analyses with the Wen-Li scheme,the TSAWSH can effectively avoid the common network attacks,has higher safe property and less computational quantity,and also has lower computational complexity.The TSAWSH can effectively reduce the overhead of the actual system.

Key words: Two-way authentication,Hash function,Packet sequence number,Man-in-the-middle attack,Off-line password guessing attack

[1] Saraswathi S,Renuka D S,Yogesh P.Secure and efficient Smart-Card-Based remote user authentication scheme for multi-server environment[J].Candian Journal of Eelectrical and Computer Engineering,2015,38(1):20-30
[2] Chen Yan-li,Du Ying-jie,Yang Geng.Efficient attribute-based authenticated key agreement protocol[J].Computer Science,2014,41(4):150-154(in Chinese) 陈燕俐,杜英杰,杨庚.一种高效的基于属性的认证密钥协商协议[J].计算机科学,2014,41(4):150-154
[3] Qiu Hui-ming,Yang Yi-xian,Hu Zheng-min.A new mutual user authentication scheme using smart card[J].Application Research of Computer,2005,22(12):103-105(in Chinese) 邱慧敏,杨义先,胡正民.一种新的基于智能卡的双向身份认证方案设计[J].计算机应用研究,2005,22(12):103-105
[4] Lamport L.Password authentication with insecure communication[J].Communication of the ACM,1981,24(11):770-772
[5] Hwang M S,Li L H.A new remote user authentication scheme using smarts[J].IEEE Transactions on Consumer Electronics,2000,46(1):28-30
[6] Zhan Li,Yao Guo-xiang,Qiang Heng-chang.Improved mutual authentication scheme based on smartcard for cloud computing [J].Computer Engineer and Design,2014,35(2):440-444(in Chinese) 詹丽,姚国祥,强衡畅.改进的基于smartcard的云用户双向认证方案[J].计算机工程与设计,2014,35(2):440-444
[7] Das M L,Saxena A,Gulati V P.A dynamic ID-based remoteuser authentication scheme[J].IEEE Transactions on Consumer Electronics,2004,50(2):629-631
[8] Wang Y Y,Liu J Y,Xiao F X,et al.A more efficient and secure dynamic ID-based remote user authentication scheme[J].Computer Communication,2009,32(4):583-585
[9] Wen F,Li X.An improved dynamic id-based remote user au-thentication with key agreement scheme[J].Journal of Compu-ter Electrical Engineering,2012,38(2):381-387
[10] Karuppiah M,Saravan R.A secure remote user mutual authentication scheme using smart cards[J].Journal of Information Security and Application,2014,19(4):282-294
[11] Gan Hong,Pan Dan.Research on dynamic ID-based remote user authentication scheme[J].Digital Communication,2014,41(5):1-5(in Chinese) 甘宏,潘丹.基于动态身份远程用户认证方案的研究[J].数字通信,2014,41(5):1-5
[12] Liu J Y,Zhou A M,Gao M X.A new mutual authenticationscheme based on nonce and smart cards[J].Computer Communications,2008,31(10):2205-2209
[13] Huang H F,Liu S E,Chen H F.Designing a new mutual au-thentication scheme based on nonce and smart cards[C]∥International Symposium on Parallel and Distributed Processing with Application,ISPA 2010.Taipei,Taiwan,2010:570-573
[14] Li C T,Hwang M S.A lightweight anonymous routing protocol without public key en/decryption for wireless ad hoc network[J].Information Science,2011,181(23):5333-5347

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .