Identity-Based SIP Authentication and Key Agreement

被引:0
|
作者
Wu ShaoBo [1 ]
Li ChengShu [2 ]
机构
[1] Beijing Jiaotong Univ, Inst Modern Commun, Beijing, Peoples R China
[2] Beijing Informat Sci & Technol, Dept Elect Informat Engn, Beijing, Peoples R China
关键词
SIP; authentication; key agreement; IBE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Session Initiation Protocol (SIP) is designed by taking the establishment of IP telephone network on Internet as the starting point, which has brought new vitality for the IP telephone services. SIP has faced a lot of security threats due to its own characteristics and the application environment. The vulnerability of SIP has been firstly analyzed in this paper. At the same time, based on the theory of identity authentication public key system, a scheme of SIP authentication and key agreement based on identity authentication has been also proposed in this paper. The structure is simple and the application is easy, which has greatly simplified the certificate management and maintenance as well as effectively improved the safety performance of SIP.
引用
收藏
页码:765 / +
页数:2
相关论文
共 50 条
  • [1] A SIP Identity Authentication Key Agreement Protocol Based on ECC
    Huang C.
    Chen J.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (05): : 747 - 755
  • [2] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [3] A New Identity-based Authentication Scheme for SIP
    Peng, Shengbo
    Ruan, Ou
    Zhou, Jing
    Chen, Zaixing
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 90 - 95
  • [4] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [5] Identity-based authentication key agreement protocol for horizontal federated learning environment
    Ren J.
    Li M.
    Du Y.
    Yin L.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2023, 49 (02): : 397 - 405
  • [6] A Two-Party Identity-Based Key Agreement Protocol with Explicit Authentication
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [7] A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
    Li, Qiang
    FUTURE INTERNET, 2023, 15 (01):
  • [8] A One-Pass Identity-Based Authentication and Key Agreement Protocol for Wireless Roaming
    Bao, Qingrui
    Hou, Mengbo
    Choo, Kim-Kwang Raymond
    2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 443 - 447
  • [9] Interdomain Identity-Based Key Agreement Schemes
    Fan, Chun-I
    Lin, Yi-Hui
    Hsu, Tuan-Hung
    Hsu, Ruei-Hau
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [10] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387