A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography

被引:77
作者
He, Debiao [1 ]
Chen, Jianhua [1 ]
Chen, Yitao [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
authentication; elliptic curve cryptosystem; security; session initiation protocol;
D O I
10.1002/sec.506
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The session initiation protocol (SIP) is one of the most important protocols supporting multimedia services. With the wide spread of the internet, the security of SIP is becoming more and more important. In 2009, Tsai proposed an efficient authentication scheme as an enhancement to SIP. However, Arshad et al. demonstrated that Tsai's scheme was vulnerable to the off-line password-guessing attack and the stolen-verifier attack. They also pointed out that Tsai's scheme did not provide known-key secrecy and perfect forward secrecy. To overcome the weaknesses, Arshad et al. also proposed an improved authentication scheme based on the elliptic curve discrete logarithm problem for SIP and claimed that their scheme can withstand various attacks. In this paper, we do a cryptanalysis of the scheme by Arshad et al., and we show that their scheme is vulnerable to the off-line password-guessing attack. We also propose an improved authentication scheme based on the elliptic curve cryptography for SIP which is immune to the presented attacks. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1423 / 1429
页数:7
相关论文
共 15 条
[1]  
[Anonymous], 2009, INT J NETW SECUR
[2]  
[Anonymous], WEAKNESSES SIP AUTHE
[3]  
[Anonymous], RFC2617 IETF
[4]   Elliptic curve cryptography based mutual authentication scheme for session initiation protocol [J].
Arshad, R. ;
Ikram, N. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) :165-178
[5]   SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL [J].
Geneiatakis, Dimitris ;
Dagiuklas, Tasos ;
Kambourakis, Georgios ;
Lambrinoudakis, Costas ;
Gritzalis, Stefanos ;
Ehlert, Sven ;
Sisalem, Dorgham .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03) :68-81
[6]  
HANDLEY M, 1999, RFC2543 IETF
[7]   A More Secure Authentication Scheme for Telecare Medicine Information Systems [J].
He Debiao ;
Chen Jianhua ;
Zhang Rui .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) :1989-1995
[8]   An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security [J].
He Debiao ;
Chen Jianhua ;
Hu Jin .
INFORMATION FUSION, 2012, 13 (03) :223-230
[9]  
Heasuk Jo, 2009, Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC, P618, DOI 10.1109/NCM.2009.251
[10]  
Huang HF, 2006, 9 JOINT C INF SCI