An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map

被引:11
作者
Guo, Xiang-Yu [1 ]
Sun, Da-Zhi [1 ]
Yang, Ying [2 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin Key Lab Adv Networking TANK, Tianjin 300350, Peoples R China
[2] Aviat Ind China, China Aeropolytechnol Estab, Standardizat Dept, Beijing 100028, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Protocols; Biometrics (access control); Chebyshev approximation; Servers; Password; biometrics; chaotic map; key agreement; security; smartcard; IMPROVED AUTHENTICATION PROTOCOL; KEY AGREEMENT PROTOCOL; SECURE; SCHEME; SIP; ECC; DESIGN;
D O I
10.1109/ACCESS.2020.3002558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session Initiation Protocol (SIP) is the most widely used signalling protocol for controlling communication, establishing, maintaining, and terminating sessions on the Internet. However, since sensitive information is often transmitted through open channels, a security authentication scheme is essential. Recently, Islam et al. proposed an authentication scheme for SIP, and argued that the scheme is immune to known attacks. However, we discover that their scheme fails to achieve user anonymity, and it cannot even resist impersonation attack. Therefore, this study proposes an enhanced mutual authentication scheme to eliminate the drawbacks of the scheme proposed by Islam et al. In addition, our proposed scheme is based on extended chaotic map, which avoids computationally expensive elliptic curve point multiplication. Then, we use Burrows-Abadi-Needham logic to prove that the proposed scheme achieves secure mutual authentication, and we use the Real-Or-Random model to analyze the formal security verification of the session key. Finally, we compare the performance and the security features of the proposed scheme with some existing schemes. Therefore, we provide better safety and efficiency than related schemes and the proposed scheme is suitable for SIP.
引用
收藏
页码:111265 / 111277
页数:13
相关论文
共 44 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] [Anonymous], SEQUENCES GAMES TOOL
  • [3] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Arshad, Hamed
    Nikooghadam, Morteza
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 181 - 197
  • [4] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [5] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [6] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
  • [7] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [8] A new two-server authentication and key agreement protocol for accessing secure cloud services
    Chattaraj, Durbadal
    Sarma, Monalisa
    Das, Ashok Kumar
    [J]. COMPUTER NETWORKS, 2018, 131 : 144 - 164
  • [9] An improved and provably secure privacy preserving authentication protocol for SIP
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Sher, Muhammad
    Farash, Mohammad Sabzinejad
    ul Hassan, Mahmood
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 1 - 15
  • [10] Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    Park, YoungHo
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) : 1310 - 1322