用户名: 密码: 验证码:
A secure and efficient mutual authentication scheme for session initiation protocol
详细信息    查看全文
  • 作者:Yanrong Lu ; Lixiang Li ; Haipeng Peng…
  • 关键词:Authentication ; Elliptic curve cryptosystem ; Key agreement ; Session initiation protocol
  • 刊名:Peer-to-Peer Networking and Applications
  • 出版年:2016
  • 出版时间:March 2016
  • 年:2016
  • 卷:9
  • 期:2
  • 页码:449-459
  • 全文大小:904 KB
  • 参考文献:1.Veltri L, Salsano S, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16(6):38–44CrossRef
    2.Arkko J, Torvinen V, Camarillo G, Niemi A, Haukka T (2002) Security mechanism agreement for SIP sessions. IETF Internet Draft, Jun
    3.Thomas M (2001) SIP Security Requirements. IETF Internet Draft, Work In Progress Nov
    4.Lu Y, Li L, Yang Y (2015) Robust and efficient authentication scheme for session initiation protocol. Math Probl Eng 2015:2015. doi:10.​1155/​2015/​894549 . Article ID 894549, 9MathSciNet
    5.Franks J, Hallam-Baker P, Hostetler J, Lawrence S, Leach P, Luotonen A. (1999) HTTP Authentication: Basic and digest access authentication. IETF RFC:2617
    6.Yang C, Wang R, Liu W (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381–386CrossRef
    7.Denning D, Sacco G (1981) Timestamps in key distribution systems. Commun ACM 24:533–536CrossRef
    8.He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429CrossRef
    9.Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:417–426CrossRef MathSciNet
    10.Liao Y, Wang S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33:372–380CrossRef
    11.Menezes A J (1997) Handbook of applied cryptography, CRC Press Inc, Vanstone, SA
    12.Miller VS (1986) Use of elliptic curves in cryptography. Advances in Cryptology-Crypto’85: Proceedings. Springer Berlin, Heidelberg, p 417
    13.Durlanik A, Sogukpinar I (2005) SIP authentication scheme using ECDH. World Enform Socity Trans. Engineering Comput Technol 8:350–353
    14.Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31:286–291CrossRef MathSciNet
    15.Yoon EJ, Yoo KY, Kim C, Hong YS, Jo M, Chen HH (2010) A secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33:1674–1681CrossRef
    16.Gokhroo MK, Jaidhar CD, Tomar AS (2011) Cryptanalysis of SIP secure and efficient authentication scheme. Proceedings ICCSN
    17.Pu Q (2010) Weaknesses of SIP authentication scheme for converged VoIP networks. IACR Cryptol ePrint Arch
    18.Tsai J (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8 (3):312–316
    19.Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178CrossRef
    20.Chen T H, Yeh H L, Liu P C, Hsiang H C, Shih W K (2010) A secured authentication protocol for SIP using elliptic curves cryptography. CN CCIS 119:46–55
    21.Lin C, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68–72CrossRef
    22.Yoon E J, Yoo K Y (2009) Cryptanalysis of DS-SIP authentication scheme using ECDH. International Conference on New Trends in Information and Service Science
    23.Xie Q (2012) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25(1):47–54CrossRef
    24.Farash M S, Attari M A (2013) An enhanced authenticated key agreement for session initiation protocol. Inf Technol Control 42(4):333–342
    25.Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography, Multimedia Tools Applied
    26.Vanstone S A (1997) Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf Secur Tech Rep 12:78–87CrossRef
    27.Stinson DR (2006) Some Observations on the theory of cryptographic hash functions. Desi Codes Crypto 38(2):259–277CrossRef MathSciNet MATH
    28.Burrow M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRef
    29.Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer
    30.Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM (2008) On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Advances in Cryptology-CRYPTO 2008. Springer, pp 203–220
    31.Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772CrossRef MathSciNet
    32.Yang W, Shieh SP (1999) Password authentication schemes with smart cards. Comput Secur 18(8):727–733CrossRef
    33.Chatterjee S, Das AK, Sing JK (2014) An enhanced access control scheme in wireless sensor networks. Ad Hoc Sensor Wireless Netw 21(1-2):121–149
    34.Odelu V, Das AK, Goswami A (2014) A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sci 269(10):270–285CrossRef MathSciNet
    35.Tu H, Kumar N, Chilamkurti N, Rho S (2014) An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Network Applied
    36.Yeh HL, Chen TH, Shih WK (2014) Robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Comput Stand Interfaces 36:397–402CrossRef
    37.Yoon EJ, Shin YN, Jeon IS, Yoo KY (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27(3):203–213CrossRef
    38.Zhang L, Tang S, Cai Z (2013), Efficient and flexible password authenticated key agreement for Voice over Internet protocol session initiation protocol using smart card. International Journal Communication System
    39.Kilinc H, Yanik T (2013) A survey of SIP authentication and key agreement schemes. IEEE Communications Surveys & Tutorials. doi:10.​1109/​SURV.​2013.​091513.​00050
  • 作者单位:Yanrong Lu (1) (2)
    Lixiang Li (1) (2)
    Haipeng Peng (1) (2)
    Yixian Yang (1) (2)

    1. Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, 100876, China
  • 刊物类别:Engineering
  • 刊物主题:Communications Engineering and Networks
    Information Systems and Communication Service
    Computer Communication Networks
  • 出版者:Springer New York
  • ISSN:1936-6450
文摘
The Session Initiation Protocol (SIP) as the core signaling protocol for multimedia services is receiving much attention. Authentication is becoming increasingly crucial issue when a user asks to use SIP services. Many authentication schemes for the SIP have been proposed. Very recently, Zhang et al. has presented an authentication scheme for SIP and claimed their scheme could overcome various attacks while maintaining efficiency. In this research, we illustrate that their scheme is susceptible to the insider attack and does not provide proper mutual authentication. We then propose a modified secure mutual authentication scheme to conquer the security flaws in Zhang et al.’s scheme. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Zhang et al.’s scheme. In addition, the performance analysis shows that our scheme has better efficiency in comparison with other related ECC-based authentication schemes for SIP. Keywords Authentication Elliptic curve cryptosystem Key agreement Session initiation protocol

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700