Information Systems Frontiers

, Volume 16, Issue 1, pp 113–127

Enhanced Dynamic Authentication Scheme (EDAS)

  • Toan-Thinh Truong
  • Minh-Triet Tran
  • Anh-Duc Duong
Article

DOI: 10.1007/s10796-013-9461-6

Cite this article as:
Truong, TT., Tran, MT. & Duong, AD. Inf Syst Front (2014) 16: 113. doi:10.1007/s10796-013-9461-6

Abstract

With non-stop growth in network environments, communication security is necessary. A strong protocol guarantees that users and service providers are secure against many kinds of attacks, such as impersonation and replay attack. Sood et al. proposed an authentication scheme based on dynamic identity to prevent transactions from being intercepted by malicious users. Although they claimed that their scheme has advantages over previous schemes with the same approach, we prove that their scheme is vulnerable to impersonation attack and stolen verification attack, and can be affected by clock synchronization. Therefore we propose a novel authentication scheme to enhance security and overcome limitations existing in Sood’s scheme. Our security analysis shows that our proposed method can efficiently resist known types of attacks. Experimental results also show that the method can be implemented and processed in real-time thus applicable for not only regular computers but also mobile devices.

Keywords

Mutual authentication Smartcard Identity-based scheme Security protocol Dynamic identity Session key agreement Hash function Password Cryptography Network communication 

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Toan-Thinh Truong
    • 1
  • Minh-Triet Tran
    • 1
  • Anh-Duc Duong
    • 2
  1. 1.University of Science, VNU-HCMHo Chi MinhVietnam
  2. 2.University of Information Technology, VNU-HCMHo Chi MinhVietnam

Personalised recommendations