Skip to main content

Dynamic Identity-Based Authentication Scheme with Perfect Forward Secrecy Session Key

  • Conference paper
AETA 2013: Recent Advances in Electrical Engineering and Related Sciences

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 282))

Abstract

Password is one of the simple and efficient methods to protect the transactions in insecure network environments. There are many authors researching in this area to suggest the protocols preventing illegitimate users from accessing the systems. In 2013, Y-H An proposed the scheme to isolate some problems which exist in Khan et al.’s scheme. In this paper, we demonstrate that Y-H An’s scheme is vulnerable to server forgery attack and cannot provide user’s anonymity. Furthermore, we also propose the modified scheme to overcome these limitations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

  2. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)

    Article  Google Scholar 

  3. Liao, I.-E., Lee, C.-C., Hwang, M.-S.: Security enhancement for a dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 629–631 (2004)

    Article  Google Scholar 

  4. Yoon, E.-J., Yoo, K.-Y.: Improving the dynamic id-based remote mutual authentication scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499–507. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Khan, M.K., Kimb, S.-K., Alghathbara, K.: Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Computer Communications 34(3), 305–309 (2010)

    Article  Google Scholar 

  6. An, Y.-H.: Security improvements of dynamic id-based remote user authentication scheme with session key agreement. In: 2013 15th International Conference on Advanced Communication Technology (ICACT), pp. 1072–1076 (2013)

    Google Scholar 

  7. Yang, J.-H., Chang, C.-C.: An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 28(3-4), 138–143 (2009)

    Article  Google Scholar 

  8. Yoon, E.-J., Yoo, K.-Y.: Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. In: IEEE International Conference on Computational Science and Engineering, vol. 2, pp. 633–640 (2009)

    Google Scholar 

  9. Islam, S.H., Biswas, G.P.: A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software 84(11), 1892–1898 (2011)

    Article  Google Scholar 

  10. Debiao, H., Jianhua, C., Jin, H.: An id-based client authentication with key agreement protocol for mobile clientserver environment on ecc with provable security. Information Fusion (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Toan-Thinh Truong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Truong, TT., Tran, MT., Duong, AD. (2014). Dynamic Identity-Based Authentication Scheme with Perfect Forward Secrecy Session Key. In: Zelinka, I., Duy, V., Cha, J. (eds) AETA 2013: Recent Advances in Electrical Engineering and Related Sciences. Lecture Notes in Electrical Engineering, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41968-3_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41968-3_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41967-6

  • Online ISBN: 978-3-642-41968-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics