Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications

被引:15
作者
Zhang, Liping [1 ]
Tang, Shanyu [1 ]
Cai, Zhihua [1 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
PROVABLY SECURE AUTHENTICATION; SCHEME;
D O I
10.1049/iet-com.2012.0783
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A suitable key agreement protocol plays an essential role in protecting the communications over open channels among users using voice over Internet protocol (VoIP). This study presents a robust and flexible password authenticated key agreement protocol with user anonymity for session initiation protocol (SIP) used by VoIP communications. Security analysis demonstrates that the proposed protocol enjoys many unique properties, such as user anonymity, no password table, session key agreement, mutual authentication, password updating freely, conveniently revoking lost smartcards and so on. Furthermore, the proposed protocol can resist the replay attack, the impersonation attack, the stolen-verifier attack, the man-in-middle attack, the Denning-Sacco attack and the offline dictionary attack with or without smartcards. Finally, the performance analysis shows that the protocol is more suitable for practical application in comparison with other related protocols. © The Institution of Engineering and Technology 2013.
引用
收藏
页码:83 / 91
页数:9
相关论文
共 22 条
[1]  
[Anonymous], P AUSCERT AS PAC INF
[2]   Elliptic curve cryptography based mutual authentication scheme for session initiation protocol [J].
Arshad, R. ;
Ikram, N. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) :165-178
[3]  
BRANOVIC I, 2004, ACM SIGARCH COMPUTER, V32, P27
[4]  
Duh DR, 2006, IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 2, PROCEEDINGS, P64
[5]  
Gokhroo M. K., 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN 2011), P308, DOI 10.1109/ICCSN.2011.6014057
[6]   A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography [J].
He, Debiao ;
Chen, Jianhua ;
Chen, Yitao .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) :1423-1429
[7]  
Heasuk Jo, 2009, Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC, P618, DOI 10.1109/NCM.2009.251
[8]  
Huang H., 2006, PROC JCIS 06 KAOSH T
[9]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[10]  
Liang Ni, 2011, Proceedings of the 2011 International Conference on Network Computing and Information Security (NCIS), P209, DOI 10.1109/NCIS.2011.49