An improved smart card based authentication scheme for session initiation protocol

被引:64
作者
Kumari, Saru [1 ]
Chaudhry, Shehzad Ashraf [2 ]
Wu, Fan [3 ]
Li, Xiong [4 ,5 ]
Farash, Mohammad Sabzinejad [6 ]
Khan, Muhammad Khurram [7 ]
机构
[1] Ch Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[2] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[3] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
[6] Kharazmi Univ, Dept Math & Comp Sci, Tehran, Iran
[7] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Authentication; Security; Anonymity and privacy; Impersonation attack; Provable security; ProVerif; UNLINKABILITY;
D O I
10.1007/s12083-015-0409-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet Protocol based communication over public channels. SIP is inherently insecure because of underlying open text architecture. A number of solutions are proposed to boost SIP security. Very recently Farash (Peer to Peer Netw. Appl. 1-10, 2014) proposed an enhanced protocol to improve the security of Tu et al.'s protocol (Peer to Peer Netw. Appl. 1-8, 2014). Further, Farash claimed his protocol to be secure against all known attacks. However, in this paper we show that Farash's protocol is insecure against impersonation attack, password guessing attack, lacks user anonymity and is vulnerable to session-specific temporary information attack. Further, we have proposed an upgraded protocol to enhance the security. The security and performance analysis shows that the proposed protocol reduced one point multiplication as compared with Farash's protocol, while resisting all known attacks. We have proved the security of proposed protocol using automated tool ProVerif.
引用
收藏
页码:92 / 105
页数:14
相关论文
共 50 条
  • [21] Robust password and smart card based authentication scheme with smart card revocation
    Xie Q.
    Liu W.-H.
    Wang S.-B.
    Hu B.
    Dong N.
    Yu X.-Y.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 418 - 424
  • [22] Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
    谢琪
    刘文浩
    王圣宝
    胡斌
    董娜
    于秀源
    Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 418 - 424
  • [23] A robust mutual authentication scheme for session initiation protocol with key establishment
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Anitha, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 900 - 916
  • [24] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Hao Lin
    Fengtong Wen
    Chunxia Du
    Multimedia Tools and Applications, 2017, 76 : 2315 - 2329
  • [25] Robust Mutual Authentication with a Key Agreement Scheme for the Session Initiation Protocol
    Yoon, Eun-Jun
    Shin, Yong-Nyuo
    Jeon, Il-Soo
    Yoo, Kee-Young
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 203 - 213
  • [26] A robust mutual authentication scheme for session initiation protocol with key establishment
    Venkatasamy Sureshkumar
    Ruhul Amin
    R. Anitha
    Peer-to-Peer Networking and Applications, 2018, 11 : 900 - 916
  • [27] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2315 - 2329
  • [28] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [29] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Arshad, Hamed
    Nikooghadam, Morteza
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 181 - 197
  • [30] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Hamed Arshad
    Morteza Nikooghadam
    Multimedia Tools and Applications, 2016, 75 : 181 - 197