Thus, as can be seen from Table 1 and Table 2, our proposed method outperforms the state-of-the-art algorithms on CASIA-FAS and
Replay Attack databases and shows comparable performances on 3DMAD and UVAD.
[7] claim that, the protocol can be prevented different types of attacks such as the man-in-the-middle
replay attacks. However, this protocol lacks a set of necessary security features and limitations: (1) the protocol still lacks mutual authentication; and (2) the AuC deploys public key encrypted message without verify the recipient of the message.
In order to get the statistical results, we run 100 simulations for the covert agent and the
replay attack, respectively.
We pay particular attention to message alteration,
replay attacks, and identity impersonation of a vehicle.
Replay Attack. To launch the
replay attack, an adversary first needs to eavesdrop these messages {[UID.sub.i], [X'.sub.i], [T.sub.i], [M.sub.1], {[M.sub.2], [Y'.sub.j], [T.sub.j]}, and {[M.sub.3], [T'.sub.i]} transmitted between a user [U.sub.i] and a service provider [S.sub.j] and then resends one of them to [U.sub.i] or [S.sub.j].
Besides, our scheme can defend against the
replay attack and man-in-middle attack and offer data security, integrity, nonrepudiation, and confidentiality in a cloud environment.
Although it was resistant to eavesdropping and impersonation attack but was vulnerable to
replay attacks, offline password guessing attacks and password related problems.
(A1)
Replay attack resistance: the proposed scheme is secure against
replay attack by adding the random nonce [N.sub.1] and the timestamp [T.sub.i] into the message.
Thus, this enhanced RUASN still has the original advantages, such as resisting
replay attacks, user impersonation attacks, gateway impersonation attacks, insider attacks, stolen-verifier attacks, offline-password guessing attacks, man-in-the-middle attacks, and gateway secret key guessing attacks.
(i)
Replay Attack. The proposed method creates one-time secret key through one-way hash function using time stamp and password.