Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network

被引:15
作者
Azad, Muhammad Ajmal [1 ]
Bag, Samiran [2 ]
Perera, Charith [3 ]
Barhamgi, Mahmoud [4 ]
Hao, Feng [2 ]
机构
[1] Univ Derby, Dept Comp Sci, Derby DE22 1GB, England
[2] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
[3] Cardiff Univ, Sch Comp Sci & Informat, Cardiff CF10 3AT, Wales
[4] Claude Bernard Lyon 1 Univ, F-69100 Villeurbanne, France
基金
英国工程与自然科学研究理事会;
关键词
Authentication; Password; Servers; Protocols; Next generation networking; Informatics; Authorization; identity spoofing; password-based authentication; session-initiation-protocol (SIP) authentication; self-enforcing authentication; KEY AGREEMENT PROTOCOL; SECURE AUTHENTICATION; SIP AUTHENTICATION; SCHEME;
D O I
10.1109/TII.2019.2941724
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) or the cyber-physical system (CPS) is the network of connected devices, things, and people that collect and exchange information using the emerging telecommunication networks (4G, 5G IP-based LTE). These emerging telecommunication networks can also be used to transfer critical information between the source and destination, informing the control system about the outage in the electrical grid, or providing information about the emergency at the national express highway. This sensitive information requires authorization and authentication of source and destination involved in the communication. To protect the network from unauthorized access and to provide authentication, the telecommunication operators have to adopt the mechanism for seamless verification and authorization of parties involved in the communication. Currently, the next-generation telecommunication networks use a digest-based authentication mechanism, where the call-processing engine of the telecommunication operator initiates the challenge to the request-initiating client or caller, which is being solved by the client to prove his credentials. However, the digest-based authentication mechanisms are vulnerable to many forms of known attacks, e.g., the man-in-the-middle (MITM) attack and the password guessing attack. Furthermore, the digest-based systems require extensive processing overheads. Several public-key infrastructure (PKI)-based and identity-based schemes have been proposed for the authentication and key agreements. However, these schemes generally require a smart card to hold long-term private keys and authentication credentials. In this article, we propose a novel self-enforcing authentication protocol for the session-initiation-protocol-based next-generation network, based on a low-entropy shared password without relying on any PKI or the trusted third party system. The proposed system shows effective resistance against various attacks, e.g., MITM, replay attack, password guessing attack, etc. We analyze the security properties of the proposed scheme in comparison to the state of the art.
引用
收藏
页码:3606 / 3615
页数:10
相关论文
共 39 条
[1]  
[Anonymous], COMMUNICATIONS COMPU
[2]  
[Anonymous], 2002, SIP SESSION INITIATI
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], 2017, IEEE T EMERGING TOPI, DOI DOI 10.1109/TETC.2017.2771251
[5]  
[Anonymous], [No title captured]
[6]  
[Anonymous], [No title captured]
[7]   Caller-REP: Detecting unwanted calls with caller social strength [J].
Azad, Muhammad Ajmal ;
Morla, Ricardo .
COMPUTERS & SECURITY, 2013, 39 :219-236
[8]   User-Centric Privacy Engineering for the Internet of Things [J].
Barhamgi, Mahmoud ;
Perera, Charith ;
Ghedira, Chirine ;
Benslimane, Djamal .
IEEE CLOUD COMPUTING, 2018, 5 (05) :47-57
[9]   An improved and provably secure privacy preserving authentication protocol for SIP [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad ;
ul Hassan, Mahmood .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) :1-15
[10]  
Chen TH, 2010, COMM COM INF SC, V119, P46