An improved and provably secure privacy preserving authentication protocol for SIP

被引:268
作者
Chaudhry, Shehzad Ashraf [1 ]
Naqvi, Husnain [1 ]
Sher, Muhammad [1 ]
Farash, Mohammad Sabzinejad [2 ]
ul Hassan, Mahmood [1 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Kharazmi Univ, Dept Math & Comp Sci, Tehran, Iran
关键词
Authentication; Authenticated key agreement; Elliptic curve cryptography; Impersonation attack; Provable security; ProVerif; SESSION INITIATION PROTOCOL; KEY AGREEMENT SCHEME; CRYPTANALYSIS; EFFICIENT; ECC;
D O I
10.1007/s12083-015-0400-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and is responsible for creating, maintaining and terminating sessions. To guarantee secure SIP based communication, a number of authentication schemes are proposed, typically most of these are based on smart card due to its temper resistance property. Recently Zhang et al. presented an authenticated key agreement scheme for SIP based on elliptic curve cryptography. However Tu et al. (Peer to Peer Netw. Appl 1-8, 2014) finds their scheme to be insecure against user impersonation attack, furthermore they presented an improved scheme and claimed it to be secure against all known attacks. Very recently Farash (Peer to Peer Netw. Appl 1-10, 2014) points out that Tu et al.'s scheme is vulnerable to server impersonation attack, Farash also proposed an improvement on Tu et al.'s scheme. However, our analysis in this paper shows that Tu et al.'s scheme is insecure against server impersonation attack. Further both Tu et al.'s scheme and Farash's improvement do not protect user's privacy and are vulnerable to replay and denial of services attacks. In order to cope with these limitations, we have proposed a privacy preserving improved authentication scheme based on ECC. The proposed scheme provides mutual authentication as well as resists all known attacks as mentioned by Tu et al. and Farash.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 40 条
  • [31] Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System
    Nicanfar, Hasen
    Leung, Victor C. M.
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) : 253 - 264
  • [32] Ryu EK, 2004, LECT NOTES COMPUT SC, V3042, P1458
  • [33] An improved authentication protocol for session initiation protocol using smart card
    Tu, Hang
    Kumar, Neeraj
    Chilamkurti, Naveen
    Rho, Seungmin
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (05) : 903 - 910
  • [34] ul Amin Noor, 2012, 2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC), P118, DOI 10.1109/ICNSC.2012.6204902
  • [35] William Stallings., 2006, Cryptography and Network Security
  • [36] A new authenticated key agreement for session initiation protocol
    Xie, Qi
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (01) : 47 - 54
  • [37] The Performance of Enhanced Liver Fibrosis (ELF) Test for the Staging of Liver Fibrosis: A Meta-Analysis
    Xie, Qingsong
    Zhou, Xiaohu
    Huang, Pengfei
    Wei, Jianfeng
    Wang, Weilin
    Zheng, Shusen
    [J]. PLOS ONE, 2014, 9 (04):
  • [38] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xu, Xin
    Zhu, Ping
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    He, Lian
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)
  • [39] Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards
    Zhang, Liping
    Tang, Shanyu
    Cai, Zhihua
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2405 - 2411
  • [40] An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem
    Zhao, Zhenguo
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (02)