An improved and provably secure privacy preserving authentication protocol for SIP

被引:268
作者
Chaudhry, Shehzad Ashraf [1 ]
Naqvi, Husnain [1 ]
Sher, Muhammad [1 ]
Farash, Mohammad Sabzinejad [2 ]
ul Hassan, Mahmood [1 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Kharazmi Univ, Dept Math & Comp Sci, Tehran, Iran
关键词
Authentication; Authenticated key agreement; Elliptic curve cryptography; Impersonation attack; Provable security; ProVerif; SESSION INITIATION PROTOCOL; KEY AGREEMENT SCHEME; CRYPTANALYSIS; EFFICIENT; ECC;
D O I
10.1007/s12083-015-0400-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and is responsible for creating, maintaining and terminating sessions. To guarantee secure SIP based communication, a number of authentication schemes are proposed, typically most of these are based on smart card due to its temper resistance property. Recently Zhang et al. presented an authenticated key agreement scheme for SIP based on elliptic curve cryptography. However Tu et al. (Peer to Peer Netw. Appl 1-8, 2014) finds their scheme to be insecure against user impersonation attack, furthermore they presented an improved scheme and claimed it to be secure against all known attacks. Very recently Farash (Peer to Peer Netw. Appl 1-10, 2014) points out that Tu et al.'s scheme is vulnerable to server impersonation attack, Farash also proposed an improvement on Tu et al.'s scheme. However, our analysis in this paper shows that Tu et al.'s scheme is insecure against server impersonation attack. Further both Tu et al.'s scheme and Farash's improvement do not protect user's privacy and are vulnerable to replay and denial of services attacks. In order to cope with these limitations, we have proposed a privacy preserving improved authentication scheme based on ECC. The proposed scheme provides mutual authentication as well as resists all known attacks as mentioned by Tu et al. and Farash.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 40 条
  • [1] Abadi M, 2009, LECT NOTES COMPUT SC, V5643, P35, DOI 10.1007/978-3-642-02658-4_5
  • [2] Abi-Char Pierre E., 2007, 2007 3rd International Symposium on Information Assurance and Security, P89
  • [3] Abi-Char PE, 2007, INT CONF NEXT GEN, P235
  • [4] Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Li, Xiong
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [5] [Anonymous], MULTIMEDIA TOOLS APP
  • [6] [Anonymous], INT J COMPUTER SCI I
  • [7] [Anonymous], 2013, IT CONVERGENCE SECUR
  • [8] [Anonymous], 2013, INT J COMMUNICATION, DOI DOI 10.1002/dac.2499
  • [9] Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
  • [10] Bellare M., 1994, CRYPTO, P232