An Improved Authentication and Key Agreement scheme for Session Initial Protocol

被引:1
作者
Wu, Libing [1 ,2 ]
Fan, Jing [2 ]
Xie, Yong [2 ,3 ]
Wang, Jing [2 ]
机构
[1] Wuhan Univ, State Key Lab Software Engn, Wuhan 430072, Hubei, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Hubei, Peoples R China
[3] Jingdezhen Ceram Inst, Jingdezhen 333403, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2017年 / 11卷 / 08期
关键词
Session initial protocol; Mutual authentication; VoIP; Anonymity; Elliptic curve cryptosystem; SECURE AUTHENTICATION; NETWORKS; PRIVACY; ECC;
D O I
10.3837/tiis.2017.08.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session initiation protocol (SIP) is a kind of powerful and common protocols applied for the voice over internet protocol. The security and efficiency are two urgent requirements and admired properties of SIP. Recently, Hamed et al. proposed an efficient authentication and key agreement scheme for SIP. However, we demonstrate that Hamed et al.'s scheme is vulnerable to de-synchronization attack and cannot provide anonymity for users. Furthermore, we propose an improved and efficient authentication and key agreement scheme by using elliptic curve cryptosystem. Besides, we prove that the proposed scheme is provably secure by using secure formal proof based on Burrows-Abadi-Needham logic. The comparison with the relevant schemes shows that our proposed scheme has lower computation costs and can provide stronger security.
引用
收藏
页码:4025 / 4042
页数:18
相关论文
共 32 条
  • [1] Privacy and human behavior in the age of information
    Acquisti, Alessandro
    Brandimarte, Laura
    Loewenstein, George
    [J]. SCIENCE, 2015, 347 (6221) : 509 - 514
  • [2] [Anonymous], 1999, RFC 2617
  • [3] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Arshad, Hamed
    Nikooghadam, Morteza
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 181 - 197
  • [4] A LOGIC OF AUTHENTICATION
    BURROWS, M
    ABADI, M
    NEEDHAM, RM
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871): : 233 - 271
  • [5] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Sher, Muhammad
    [J]. ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) : 113 - 139
  • [6] Mobile device integration of a fingerprint biometric remote authentication scheme
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Hsu, Chao-Yung
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (05) : 585 - 597
  • [7] Durlanik A, 2005, PROC WRLD ACAD SCI E, V8, P350
  • [8] An Enhanced Authenticated Key Agreement for Session Initiation Protocol
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 333 - 342
  • [9] Security and Efficiency in Roaming Services for Wireless Networks: Challenges, Approaches, and Prospects
    He, Daojing
    Chen, Chun
    Bu, Jiajun
    Chan, Sammy
    Zhang, Yan
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (02) : 142 - 150
  • [10] Hughes D, 2014, J COMPUTER SECURITY, V12, P3