Robust and Efficient Authentication Scheme for Session Initiation Protocol

被引:21
作者
Lu, Yanrong [1 ,2 ]
Li, Lixiang [1 ,2 ]
Yang, Yixian [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; SECURE AUTHENTICATION; ACCESS-CONTROL; SIP;
D O I
10.1155/2015/894549
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam's authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.'s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.
引用
收藏
页数:9
相关论文
共 31 条
  • [1] [Anonymous], 2009, INT J NETW SECUR
  • [2] [Anonymous], P 9 JOINT C INF SCI
  • [3] Arshad H., 2014, MULTIMEDIA TOOLS APP
  • [4] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [5] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
  • [6] Chatterjee S, 2014, AD HOC SENS WIREL NE, V21, P121
  • [7] Das A. K., 2013, J MED SYST, V37
  • [8] Durlanik A, 2005, PROC WRLD ACAD SCI E, V8, P350
  • [9] Eisenbarth T, 2008, LECT NOTES COMPUT SC, V5157, P203, DOI 10.1007/978-3-540-85174-5_12
  • [10] An Enhanced Authenticated Key Agreement for Session Initiation Protocol
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 333 - 342