In a paper recently published in the IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, Zhu and Ma proposed a new authentication scheme with anonymity for wireless environments. However, this paper shows that Zhu and Ma’s scheme has some security weaknesses. Therefore, in this paper, a slight modifi-cation to their scheme is proposed to improve their shortcomings.As a result, the scheme proposed in this paper can enhance the security of Zhu and Ma’s scheme. Finally, the performance of this scheme is analyzed. Compared with the Zhu–Ma scheme, this scheme is also simple and efficient.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS,53(5),1683-1687.