A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card

被引:0
|
作者
Dheerendra Mishra
Ashok Kumar Das
Sourav Mukhopadhyay
机构
[1] Indian Institute of Technology Kharagpur,Department of Mathematics
[2] International Institute of Information Technology,Center for Security, Theory and Algorithmic Research
关键词
Session initiation protocol; Authentication; Key agreement; Anonymity; AVISPA; Security;
D O I
暂无
中图分类号
学科分类号
摘要
The Session Initiation Protocol (SIP) is a signaling communications protocol, which has been chosen for controlling multimedia communication in 3G mobile networks. The proposed authentication in SIP is HTTP digest based authentication. Recently, Tu et al. presented an improvement of Zhang et al.’s smart card-based authenticated key agreement protocol for SIP. Their scheme efficiently resists password guessing attack. However, in this paper, we analyze the security of Tu et al.’s scheme and demonstrate their scheme is still vulnerable to user’s impersonation attack, server spoofing attack and man-in-the middle attack. We aim to propose an efficient improvement on Tu et al.’s scheme to overcome the weaknesses of their scheme, while retaining the original merits of their scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against various known attacks including the attacks found in Tu et al.’s scheme. Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks including the replay and man-in-the-middle attacks. Additionally, the proposed scheme is comparable in terms of the communication and computational overheads with Tu et al.’s scheme and other related existing schemes.
引用
收藏
页码:171 / 192
页数:21
相关论文
共 50 条
  • [1] A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (01) : 171 - 192
  • [2] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Gupta, Vidushi
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (03) : 643 - 653
  • [3] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Vidushi Gupta
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 643 - 653
  • [4] An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 1 - 19
  • [5] A Secure and Efficient ECC-Based Anonymous Authentication Protocol
    Wang, Feifei
    Xu, Guoai
    Gu, Lize
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [6] ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
    Kumari, Adesh
    Jangirala, Srinivas
    Abbasi, M. Yahya
    Kumar, Vinod
    Alam, Mansaf
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51 (51)
  • [7] A robust ECC based mutual authentication protocol with anonymity for session initiation protocol
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Li, Linsen
    Alzahrani, Bander
    [J]. PLOS ONE, 2017, 12 (10):
  • [8] An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS
    Chandrakar, Preeti
    Om, Hari
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (08)
  • [9] Smart Card Based Password Authentication and User Anonymity Scheme using ECC and Steganography
    Singh, Vineeta
    Dahiya, Priyanka
    Singh, Sanjay
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1614 - 1621
  • [10] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Hamed Arshad
    Morteza Nikooghadam
    [J]. Multimedia Tools and Applications, 2016, 75 : 181 - 197