A New Identity-based Authentication Scheme for SIP

被引:1
|
作者
Peng, Shengbo [1 ]
Ruan, Ou [1 ]
Zhou, Jing [1 ]
Chen, Zaixing [1 ]
机构
[1] Hubei Univ Technol, Coll Comp Sci & Technol, Wuhan, Peoples R China
关键词
SIP; authentication scheme; identity-based cryptography; HTTP digest authentication; PROVABLY SECURE AUTHENTICATION; MECHANISM; ATTACKS;
D O I
10.1109/AsiaJCIS.2014.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The session initiation protocol (SIP) is considered as the dominant signaling protocol for Voice over IP. However, SIP authentication typically uses HTTP digest authentication, which is vulnerable to many forms of known attacks. This paper proposes a new secure SIP authentication scheme using identity-based cryptography, which provides stronger security assurances for SIP mutual authentication and session key agreement. The main merits include: (1) it achieves mutual authentication and session key agreement; (2) it does not maintain any password or verification table in the server; (3) it prevents various possible attacks induced by open networks and signaling attack for the standard SIP messages; (4) it effectively avoids the requirement of a large public key infrastructure.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 50 条
  • [1] Identity-Based SIP Authentication and Key Agreement
    Wu ShaoBo
    Li ChengShu
    [J]. EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 765 - +
  • [2] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    [J]. 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [3] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    [J]. 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [4] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [5] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566
  • [6] An Identity-based Access Authentication Scheme for Heterogeneous Wireless Network
    Hou Huifang
    Wang Yuhua
    Wang Yunxia
    Liu Guangqiang
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 231 - 234
  • [7] Secure Dynamic Identity-Based Remote User Authentication Scheme
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2010, 5966 : 224 - 235
  • [8] Research on Identity-based Batch Anonymous Authentication Scheme for VANET
    Song, Cheng
    Gu, Xinan
    Wang, Lei
    Liu, Zhizhong
    Ping, Yuan
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (12): : 6175 - 6189
  • [9] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [10] An Identity-Based One-Time Password Scheme with Anonymous Authentication
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 864 - 867