An improved and provably secure privacy preserving authentication protocol for SIP

被引:0
作者
Shehzad Ashraf Chaudhry
Husnain Naqvi
Muhammad Sher
Mohammad Sabzinejad Farash
Mahmood Ul Hassan
机构
[1] International Islamic University,Department of Computer Science and Software Engineering
[2] Department of Mathematics and Computer Sciences Kharazmi University,undefined
来源
Peer-to-Peer Networking and Applications | 2017年 / 10卷
关键词
Authentication; Authenticated key agreement; Elliptic curve cryptography; Impersonation attack; Provable security; ProVerif;
D O I
暂无
中图分类号
学科分类号
摘要
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and is responsible for creating, maintaining and terminating sessions. To guarantee secure SIP based communication, a number of authentication schemes are proposed, typically most of these are based on smart card due to its temper resistance property. Recently Zhang et al. presented an authenticated key agreement scheme for SIP based on elliptic curve cryptography. However Tu et al. (Peer to Peer Netw. Appl 1–8, 2014) finds their scheme to be insecure against user impersonation attack, furthermore they presented an improved scheme and claimed it to be secure against all known attacks. Very recently Farash (Peer to Peer Netw. Appl 1–10, 2014) points out that Tu et al.’s scheme is vulnerable to server impersonation attack, Farash also proposed an improvement on Tu et al.’s scheme. However, our analysis in this paper shows that Tu et al.’s scheme is insecure against server impersonation attack. Further both Tu et al.’s scheme and Farash’s improvement do not protect user’s privacy and are vulnerable to replay and denial of services attacks. In order to cope with these limitations, we have proposed a privacy preserving improved authentication scheme based on ECC. The proposed scheme provides mutual authentication as well as resists all known attacks as mentioned by Tu et al. and Farash.
引用
收藏
页码:1 / 15
页数:14
相关论文
共 74 条
[1]  
Amin R(2015)An improved rsa based user authentication and session key agreement protocol usable in tmis. J Med Syst 39 1-14
[2]  
Biswas G(2015)A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J Med Syst 39 1-19
[3]  
Amin R(2015)A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis. J Med Syst 39 1-17
[4]  
Biswas G(1991)Remote password authentication with smart cards IEEE Proceedings Computers and Digital Techniques 138 165-168
[5]  
Amin R(2015)Comment on ‘robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications’. IET Commun 9 1034-1034(1)
[6]  
Biswas G(2015)Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems J Med Syst 39 66-988
[7]  
Chang CC(2013)Two id-based authenticated schemes with key agreement for mobile environments J Supercomput 66 973-1418
[8]  
Wu TC(2014)An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics Expert Systems with Applications 41 1411-230
[9]  
Chaudhry SA(2012)An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security Information Fusion 13 223-411
[10]  
Chaudhry SA(2014)An improved password-based authentication scheme for session initiation protocol using smart cards without verification table Int J Commun Syst 69 395-630