Abstract
Password is one of the simple and efficient methods to protect the transactions in insecure network environments. There are many authors researching in this area to suggest the protocols preventing illegitimate users from accessing the systems. In 2013, Y-H An proposed the scheme to isolate some problems which exist in Khan et al.’s scheme. In this paper, we demonstrate that Y-H An’s scheme is vulnerable to server forgery attack and cannot provide user’s anonymity. Furthermore, we also propose the modified scheme to overcome these limitations.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)
Das, M.L., Saxena, A., Gulati, V.P.: A dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)
Liao, I.-E., Lee, C.-C., Hwang, M.-S.: Security enhancement for a dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 629–631 (2004)
Yoon, E.-J., Yoo, K.-Y.: Improving the dynamic id-based remote mutual authentication scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499–507. Springer, Heidelberg (2006)
Khan, M.K., Kimb, S.-K., Alghathbara, K.: Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Computer Communications 34(3), 305–309 (2010)
An, Y.-H.: Security improvements of dynamic id-based remote user authentication scheme with session key agreement. In: 2013 15th International Conference on Advanced Communication Technology (ICACT), pp. 1072–1076 (2013)
Yang, J.-H., Chang, C.-C.: An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 28(3-4), 138–143 (2009)
Yoon, E.-J., Yoo, K.-Y.: Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. In: IEEE International Conference on Computational Science and Engineering, vol. 2, pp. 633–640 (2009)
Islam, S.H., Biswas, G.P.: A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software 84(11), 1892–1898 (2011)
Debiao, H., Jianhua, C., Jin, H.: An id-based client authentication with key agreement protocol for mobile clientserver environment on ecc with provable security. Information Fusion (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Truong, TT., Tran, MT., Duong, AD. (2014). Dynamic Identity-Based Authentication Scheme with Perfect Forward Secrecy Session Key. In: Zelinka, I., Duy, V., Cha, J. (eds) AETA 2013: Recent Advances in Electrical Engineering and Related Sciences. Lecture Notes in Electrical Engineering, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41968-3_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-41968-3_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41967-6
Online ISBN: 978-3-642-41968-3
eBook Packages: EngineeringEngineering (R0)