A provably secure anonymous authentication scheme for Session Initiation Protocol

被引:16
作者
Chaudhry, Shehzad Ashraf [1 ]
Khan, Imran [1 ]
Irshad, Azeem [1 ]
Ashraf, Muhammad Usman [1 ]
Khan, Muhammad Khurram [2 ]
Ahmad, Hafiz Farooq [3 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[3] King Faisal Univ, Coll Comp Sci & Informat Technol, Alahssa, Saudi Arabia
关键词
password; authentication; key agreement; provable security; impersonation attack; correctness; PROVERIF; KEY AGREEMENT SCHEME; SIP AUTHENTICATION; MUTUAL AUTHENTICATION; NETWORKS;
D O I
10.1002/sec.1672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Lu et al. presented a mutual authentication scheme for Session Initiation Protocol. Lu et al. claimed their scheme provides safeguard against familiar attacks and offers efficient authentication facility. However, this paper divulges that the scheme of Lu et al. is prone to server and user impersonation attacks. Additionally, the scheme of Lu et al. implicates correctness concerns. Consequently, an enhanced scheme is proposed, not only to resolve correctness concerns but also to provide robustness against server and user impersonation attacks. The proposed scheme makes use of a user-specific secret parameter to deal with the security and correctness issues. The formal and informal security analysis proves the robustness and efficiency of the proposed scheme against all familiar attacks. Furthermore, security analysis is also substantiated through popular automated tool PROVERIF. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5016 / 5027
页数:12
相关论文
共 40 条
  • [1] Abadi M, 2009, LECT NOTES COMPUT SC, V5643, P35, DOI 10.1007/978-3-642-02658-4_5
  • [2] Alizadeh M, 2015, J TEKNOL, V72
  • [3] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [4] [Anonymous], SIP SECURIT IN PRESS
  • [5] [Anonymous], P ICCSN
  • [6] [Anonymous], IACR CRYPTOL EPRINT
  • [7] Arkko J, 2003, SECURITY ME IN PRESS
  • [8] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [9] Breaking a remote user authentication scheme for multi-server architecture
    Cao, Xiang
    Zhong, Sheng
    [J]. IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) : 580 - 581
  • [10] An enhanced privacy preserving remote user authentication scheme with provable security
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3782 - 3795