Robust and Efficient Authentication Scheme for Session Initiation Protocol

被引:21
作者
Lu, Yanrong [1 ,2 ]
Li, Lixiang [1 ,2 ]
Yang, Yixian [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; SECURE AUTHENTICATION; ACCESS-CONTROL; SIP;
D O I
10.1155/2015/894549
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam's authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.'s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.
引用
收藏
页数:9
相关论文
共 31 条
  • [21] The Impact of TLS on SIP Server Performance: Measurement and Modeling
    Shen, Charles
    Nahum, Erich
    Schulzrinne, Henning
    Wright, Charles P.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (04) : 1217 - 1230
  • [22] Novel Anonymous Authentication Scheme Using Smart Cards
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (04) : 2004 - 2013
  • [23] Tu H., 2014, PEER TO PEER NETWORK
  • [24] A new provably secure authentication and key agreement protocol for SIP using ECC
    Wu, Liufei
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 286 - 291
  • [25] A new authenticated key agreement for session initiation protocol
    Xie, Qi
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (01) : 47 - 54
  • [26] Secure authentication scheme for session initiation protocol
    Yang, CC
    Wang, RC
    Liu, WT
    [J]. COMPUTERS & SECURITY, 2005, 24 (05) : 381 - 386
  • [27] Password authentication schemes with smart cards
    Yang, WH
    Shieh, SP
    [J]. COMPUTERS & SECURITY, 1999, 18 (08) : 727 - 733
  • [28] A secure and efficient SIP authentication scheme for converged VoIP networks
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Kim, Cheonshik
    Hong, You-Sik
    Jo, Minho
    Chen, Hsiao-Hwa
    [J]. COMPUTER COMMUNICATIONS, 2010, 33 (14) : 1674 - 1681
  • [29] Robust Mutual Authentication with a Key Agreement Scheme for the Session Initiation Protocol
    Yoon, Eun-Jun
    Shin, Yong-Nyuo
    Jeon, Il-Soo
    Yoo, Kee-Young
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (03) : 203 - 213
  • [30] Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card
    Zhang, Liping
    Tang, Shanyu
    Cai, Zhihua
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2691 - 2702