Karpagam JCS ISSN: 2582 – 8525 (Print), 2583 – 3669 (Online)

An Authentication Scheme with Anonymity for Wireless Environment

Abstract
Transferring data is the most important goal in our life. Because our life is built on sharing data, sending and receiving information between people. Most of these data are confidential, so we should safe it from any body that doesn't have permission to get it. When talking about saving data, we mean the security methods. We find that the security methods contain many encryption and decryption algorithms. So, this documentation focused on how to increase the complexity of the encryption method. In a paper recently published in the IEEE Transactions on Consumer Electronics, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows the improvements of Zhu-Ma scheme in security field. By using different keys in complex hash (i.e. MD4, MD5, and SHA1) function and the keys periodically are changed depending on the time. We note that it is difficult to obtain both the keys and original data.

View Full Article

Download or view the complete article PDF published by the author.

📥 Download PDF 👁️ View in Browser