Efficient ID-based authentication and key agreement protocols for the session initiation protocol

被引:1
|
作者
Kilinc, Haci Hakan [1 ]
Allaberdiyev, Yolguly [2 ]
Yanik, Tugrul [3 ]
Erdem, Serdar Suer [1 ]
机构
[1] Gebze Inst Technol, Dept Elect Engn, TR-41400 Gebze, Kocaeli, Turkey
[2] Fatih Univ, Dept Comp Engn, Istanbul, Turkey
[3] Celal Bayar Univ, Dept Comp Engn, Muradiye, Manisa, Turkey
关键词
SIP; ID-based cryptography; authentication; key agreement; SECURE AUTHENTICATION; SIP; MECHANISM; SCHEME; ISSUES;
D O I
10.3906/elk-1207-102
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a widely deployed VoIP system tens of thousands of clients compete for the SIP proxy server's authentication service. SIP protocol implementations have to meet certain QoS and security requirements. In this study new ID-based protocols are proposed for the SIP authentication and key agreement protocols. These protocols minimize the use of expensive pairing functions but still resist notable attacks. The security of the proposed protocols are analyzed and demonstrated with security proofs based on the BJM security model. Finally, the performance overhead of the proposed protocols are compared to ID-based SIP authentication and key agreement protocols given in the literature.
引用
收藏
页码:560 / 579
页数:20
相关论文
共 50 条
  • [1] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [2] Efficient ID-based deniable authentication protocols
    Shi, Yijuan
    Li, Jianhua
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 321 - 324
  • [3] An efficient ID-Based authenticated key agreement protocol from pairings
    Ryu, EK
    Yoon, EJ
    Yoo, KY
    [J]. NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1458 - 1463
  • [4] Efficient ID-based authenticated key agreement protocol based on Weil pairing
    Shim, K
    [J]. ELECTRONICS LETTERS, 2003, 39 (08) : 653 - 654
  • [5] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [6] Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1072 - 1076
  • [7] An Improved ID-Based Group Key Agreement Protocol
    Hu, Kangwen
    Xue, Jingfeng
    Hu, Changzhen
    Ma, Rui
    Li, Zhiqiang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 421 - 428
  • [8] An Improved ID-Based Group Key Agreement Protocol
    Kangwen Hu
    Jingfeng Xue
    Changzhen Hu
    Rui Ma
    Zhiqiang Li
    [J]. Tsinghua Science and Technology, 2014, 19 (05) : 421 - 428
  • [9] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [10] Efficient ID-Based One Round Authenticated Group Key Agreement Protocol
    Shi, Yijuan
    Chen, Gongliang
    Li, Jianhua
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 167 - 170