A New Identity-based Authentication Scheme for SIP

被引:1
|
作者
Peng, Shengbo [1 ]
Ruan, Ou [1 ]
Zhou, Jing [1 ]
Chen, Zaixing [1 ]
机构
[1] Hubei Univ Technol, Coll Comp Sci & Technol, Wuhan, Peoples R China
关键词
SIP; authentication scheme; identity-based cryptography; HTTP digest authentication; PROVABLY SECURE AUTHENTICATION; MECHANISM; ATTACKS;
D O I
10.1109/AsiaJCIS.2014.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The session initiation protocol (SIP) is considered as the dominant signaling protocol for Voice over IP. However, SIP authentication typically uses HTTP digest authentication, which is vulnerable to many forms of known attacks. This paper proposes a new secure SIP authentication scheme using identity-based cryptography, which provides stronger security assurances for SIP mutual authentication and session key agreement. The main merits include: (1) it achieves mutual authentication and session key agreement; (2) it does not maintain any password or verification table in the server; (3) it prevents various possible attacks induced by open networks and signaling attack for the standard SIP messages; (4) it effectively avoids the requirement of a large public key infrastructure.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 50 条
  • [31] An identity-based authentication scheme for safety messages in WAVE-enabled VANETs
    Biswas, Subir
    Misic, Jelena
    Misic, Vojislav
    [J]. INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2012, 27 (06) : 541 - 562
  • [32] An Identity-Based Authentication Scheme With Full Anonymity and Unlinkability for Mobile Edge Computing
    Tian, Junfeng
    Wang, Yiting
    Shen, Yue
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23561 - 23576
  • [33] Secure Identity-based Authentication Scheme Suitable for Limited-resource Devices
    Toan-Thinh Truong
    Vi-Minh Luong
    Minh-Triet Tran
    Anh-Duc Duong
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 271 - 276
  • [34] Identity-based Public Key Keyword Searchable Encryption Scheme with Denial Authentication
    Cao Suzhen
    Ding Binbin
    Ding Xiaohui
    Dou Fengge
    Wang Caifen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (03) : 1086 - 1092
  • [35] A Novel Identity-Based Mutual Authentication Scheme for Vehicle Ad Hoc Networks
    Di, Chaofan
    Wu, Wanqing
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [36] IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things
    Jia, Xudong
    Hu, Ning
    Su, Shen
    Yin, Shi
    Zhao, Yan
    Cheng, Xinda
    Zhang, Chi
    [J]. ELECTRONICS, 2020, 9 (04)
  • [37] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    [J]. AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [38] A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Jia, Xiaoying
    Luo, Min
    Choo, Kim-Kwang Raymond
    Li, Li
    He, Debiao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 10108 - 10120
  • [39] A new identity-based conference key distribution scheme
    Xu, SB
    van Tilborg, H
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 269 - 269
  • [40] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651