An improved smart card based authentication scheme for session initiation protocol

被引:65
作者
Kumari, Saru [1 ]
Chaudhry, Shehzad Ashraf [2 ]
Wu, Fan [3 ]
Li, Xiong [4 ,5 ]
Farash, Mohammad Sabzinejad [6 ]
Khan, Muhammad Khurram [7 ]
机构
[1] Ch Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[2] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[3] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
[6] Kharazmi Univ, Dept Math & Comp Sci, Tehran, Iran
[7] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Authentication; Security; Anonymity and privacy; Impersonation attack; Provable security; ProVerif; UNLINKABILITY;
D O I
10.1007/s12083-015-0409-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet Protocol based communication over public channels. SIP is inherently insecure because of underlying open text architecture. A number of solutions are proposed to boost SIP security. Very recently Farash (Peer to Peer Netw. Appl. 1-10, 2014) proposed an enhanced protocol to improve the security of Tu et al.'s protocol (Peer to Peer Netw. Appl. 1-8, 2014). Further, Farash claimed his protocol to be secure against all known attacks. However, in this paper we show that Farash's protocol is insecure against impersonation attack, password guessing attack, lacks user anonymity and is vulnerable to session-specific temporary information attack. Further, we have proposed an upgraded protocol to enhance the security. The security and performance analysis shows that the proposed protocol reduced one point multiplication as compared with Farash's protocol, while resisting all known attacks. We have proved the security of proposed protocol using automated tool ProVerif.
引用
收藏
页码:92 / 105
页数:14
相关论文
共 50 条
[21]   Robust password and smart card based authentication scheme with smart card revocation [J].
Xie Q. ;
Liu W.-H. ;
Wang S.-B. ;
Hu B. ;
Dong N. ;
Yu X.-Y. .
Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) :418-424
[22]   Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation [J].
谢琪 ;
刘文浩 ;
王圣宝 ;
胡斌 ;
董娜 ;
于秀源 .
JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) :418-424
[23]   A robust mutual authentication scheme for session initiation protocol with key establishment [J].
Sureshkumar, Venkatasamy ;
Amin, Ruhul ;
Anitha, R. .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) :900-916
[24]   An anonymous and secure authentication and key agreement scheme for session initiation protocol [J].
Hao Lin ;
Fengtong Wen ;
Chunxia Du .
Multimedia Tools and Applications, 2017, 76 :2315-2329
[25]   A robust mutual authentication scheme for session initiation protocol with key establishment [J].
Venkatasamy Sureshkumar ;
Ruhul Amin ;
R. Anitha .
Peer-to-Peer Networking and Applications, 2018, 11 :900-916
[26]   Robust Mutual Authentication with a Key Agreement Scheme for the Session Initiation Protocol [J].
Yoon, Eun-Jun ;
Shin, Yong-Nyuo ;
Jeon, Il-Soo ;
Yoo, Kee-Young .
IETE TECHNICAL REVIEW, 2010, 27 (03) :203-213
[27]   An anonymous and secure authentication and key agreement scheme for session initiation protocol [J].
Lin, Hao ;
Wen, Fengtong ;
Du, Chunxia .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) :2315-2329
[28]   A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography [J].
He, Debiao ;
Chen, Jianhua ;
Chen, Yitao .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) :1423-1429
[29]   An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) :181-197
[30]   An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC [J].
Hamed Arshad ;
Morteza Nikooghadam .
Multimedia Tools and Applications, 2016, 75 :181-197