A New Efficient SIP Authentication and Key Agreement Protocol Based on Chaotic Maps and Using Smart Card

被引:1
作者
Azrour, Mourade [1 ]
Ouanan, Mohammed [1 ]
Farhaoui, Yousef [1 ]
机构
[1] Moulay Ismail Univ, Fac Sci & Technol, Dept Comp Sci, Lab M2I,ASIA Team, Errachidia, Morocco
来源
ICCWCS'17: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND WIRELESS COMMUNICATION SYSTEMS | 2017年
关键词
Session Initiation Protocol; Security; Authentication; Key agreement; Chaotic maps; Smart Card; SECURE AUTHENTICATION; SCHEME;
D O I
10.1145/3167486.3167559
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Telephony over IP is a service that allows exchanging flux multimedia via internet; it is based on two types of protocols: signalling protocols and transport protocols. The most popular signalling protocol is Session Initiation Protocol (SIP). The authentication is the required security service recommended by SIP. To response to this issue, several protocols have been proposed. In this paper we have based on proposed authentication protocol based on chaotic maps to propose an efficient SIP authentication and key agreement protocol based on chaotic maps and using smart card. The security and performance analysis shows that our proposed protocol can resist to various attacks.
引用
收藏
页数:8
相关论文
共 47 条
[1]  
[Anonymous], 2009, INT J NETW SECUR
[2]  
[Anonymous], 1999, SIP SESSION INITIATI
[3]  
[Anonymous], 2013, INT J COMMUNICATION, DOI DOI 10.1002/dac.2499
[4]  
[Anonymous], NONLINEAR DYNAMICS
[5]   An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) :181-197
[6]   Elliptic curve cryptography based mutual authentication scheme for session initiation protocol [J].
Arshad, R. ;
Ikram, N. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) :165-178
[7]   A new secure authentication and key exchange protocol for session initiation protocol using smart card [J].
Azrour, Mourade ;
Farhaoui, Yousef ;
Ouanan, Mohammed .
International Journal of Network Security, 2017, 19 (06) :870-879
[8]  
Azrour M., 2017, INT J TOMOGR SIMULAT, V30, P47
[9]  
Azrour M., INT C INF TECHN COMM, DOI [10.1007/978-3-319-64719-7, DOI 10.1007/978-3-319-64719-7]
[10]  
Azrour M., 2017, INDONESIAN J ELECT E, V7, P457