Enhanced Dynamic Authentication Scheme (EDAS)

  • Authors:
  • Toan-Thinh Truong;Minh-Triet Tran;Anh-Duc Duong

  • Affiliations:
  • University of Science, VNU-HCM, Ho Chi Minh, Vietnam;University of Science, VNU-HCM, Ho Chi Minh, Vietnam;University of Information Technology, VNU-HCM, Ho Chi Minh, Vietnam

  • Venue:
  • Information Systems Frontiers
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

With non-stop growth in network environments, communication security is necessary. A strong protocol guarantees that users and service providers are secure against many kinds of attacks, such as impersonation and replay attack. Sood et al. proposed an authentication scheme based on dynamic identity to prevent transactions from being intercepted by malicious users. Although they claimed that their scheme has advantages over previous schemes with the same approach, we prove that their scheme is vulnerable to impersonation attack and stolen verification attack, and can be affected by clock synchronization. Therefore we propose a novel authentication scheme to enhance security and overcome limitations existing in Sood's scheme. Our security analysis shows that our proposed method can efficiently resist known types of attacks. Experimental results also show that the method can be implemented and processed in real-time thus applicable for not only regular computers but also mobile devices.