Identity-Based SIP Authentication and Key Agreement

被引:0
|
作者
Wu ShaoBo [1 ]
Li ChengShu [2 ]
机构
[1] Beijing Jiaotong Univ, Inst Modern Commun, Beijing, Peoples R China
[2] Beijing Informat Sci & Technol, Dept Elect Informat Engn, Beijing, Peoples R China
关键词
SIP; authentication; key agreement; IBE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Session Initiation Protocol (SIP) is designed by taking the establishment of IP telephone network on Internet as the starting point, which has brought new vitality for the IP telephone services. SIP has faced a lot of security threats due to its own characteristics and the application environment. The vulnerability of SIP has been firstly analyzed in this paper. At the same time, based on the theory of identity authentication public key system, a scheme of SIP authentication and key agreement based on identity authentication has been also proposed in this paper. The structure is simple and the application is easy, which has greatly simplified the certificate management and maintenance as well as effectively improved the safety performance of SIP.
引用
收藏
页码:765 / +
页数:2
相关论文
共 50 条
  • [41] Identity-based authenticated key agreement protocol based on Weil pairing
    Smart, NP
    ELECTRONICS LETTERS, 2002, 38 (13) : 630 - 632
  • [42] Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks
    Shi, Run-hua
    Zhong, Hong
    Zhang, Shun
    JOURNAL OF SUPERCOMPUTING, 2015, 71 (11): : 4015 - 4018
  • [43] AN AUTHENTICATION AND SESSION KEY AGREEMENT PROTOCOL BASED ON IDENTITY SIGNATURE
    Li, Ning
    Yeap, Tet
    Yu, Chongxiu
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 311 - +
  • [44] An attack on the identity-based key agreement protocols in multiple PKG environment
    Oh, J
    Moon, S
    Ma, JF
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (03) : 826 - 829
  • [45] An identity-based authenticated key agreement scheme for heterogeneous sensor networks
    Fu, Xiaojing
    Zhang, Guoyin
    Ma, Chunguang
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 582 - 586
  • [46] Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge
    Zhang, Jie
    Zhang, Futai
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (09): : 6688 - 6702
  • [47] Strongly-secure identity-based key agreement and anonymous extension
    Chow, Sherman S. M.
    Choo, Kim-Kwang Raymond
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 203 - +
  • [48] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [49] An identity-based authenticated key agreement protocol without bilinear pairing
    Cao, Xue-Fei
    Kou, Wei-Dong
    Fan, Kai
    Zhang, Jun
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (05): : 1241 - 1244
  • [50] Cryptanalysis on identity-based authenticated key agreement protocols from pairings
    Hou M.
    Xu Q.
    Shanqing G.
    Jiang H.
    Journal of Networks, 2010, 5 (07) : 855 - 862