An anonymous and secure authentication and key agreement scheme for session initiation protocol

被引:0
作者
Hao Lin
Fengtong Wen
Chunxia Du
机构
[1] University of Jinan,School of Mathematical Science
来源
Multimedia Tools and Applications | 2017年 / 76卷
关键词
Authentication; Session Initiation Protocol (SIP); Security attacks; User anonymity; The elliptic curve discrete logarithm problem;
D O I
暂无
中图分类号
学科分类号
摘要
In 2014, Arshad and Nikooghadam proposed an authentication and key agreement scheme for SIP to conquer the existing defects in Irshad et al.’s scheme. They claimed that their scheme resists various security attacks and has low computation cost. We found that even though Arshad et al.’s scheme achieves high efficiency, their scheme is insecure against server spoofing attacks, denial of service attacks and privilege insider attacks. Furthermore, the password change phase of their scheme is complicated and their scheme cannot provide user anonymity. To overcome the weaknesses of Arshad et al.’s scheme, we proposed an anonymous and secure authentication and key agreement protocol for SIP. Compared with Arshad et al.’s scheme, our scheme not only withstands more security attacks, but also achieves user anonymity and high efficiency.
引用
收藏
页码:2315 / 2329
页数:14
相关论文
共 49 条
[1]  
Arshad R(2013)Elliptic curve cryptography based mutual authentication scheme for session initiation protocol Multimed Tools Appl 66 165-178
[2]  
Ikram N(2014)An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC Multimed Tools Appl 1666 388-397
[3]  
Arshad H(2015)An improved biometrics-based authentication scheme for Telecare medical information systems J Med Syst 14 36-45
[4]  
Nikooghadam M(2013)A single round-trip SIP authentication scheme for voice over internet protocol using smart card Multimed Tools Appl 35 763-769
[5]  
Guo DL(1999)Differential power analysis Advances in Cryptology-CRYPTO’99 51 541-552
[6]  
Wen QY(2009)Smart card applications and security Inf Secur Tech Rep 38 1-7
[7]  
Li WM(2012)An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards J Netw Comput Appl 7 987-993
[8]  
Zhang H(2002)Examining smart-card security under the threat of power analysis attacks IEEE Trans Comput 35 54-62
[9]  
Jin ZP(2014)A more secure anonymous user authentication scheme for the integrated EPR information system J Med Syst 80 195-206
[10]  
Irshad A(2014)A robust smart card based anonymous user authentication protocol for wireless communications Secur Commun Netw 36 397-402