Cryptanalysis of an Anonymous Wireless Authentication and Conference Key Distribution Scheme
n this paper we analyse an anonymous wireless authentication and con- ference key distribution scheme which is also designed to provide mobile participants with user identification privacy during the conference call. The proposed scheme consists of three sub-protocols: the Call Set-Up Authenti- cation Protocol, the Hand-Off Authentication Protocol, and the Anonymous Conference Call Protocol. We show that the proposed scheme suffers from a number of security vulnerabilities.