A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card

被引:0
|
作者
Dheerendra Mishra
Ashok Kumar Das
Sourav Mukhopadhyay
机构
[1] Indian Institute of Technology Kharagpur,Department of Mathematics
[2] International Institute of Information Technology,Center for Security, Theory and Algorithmic Research
关键词
Session initiation protocol; Authentication; Key agreement; Anonymity; AVISPA; Security;
D O I
暂无
中图分类号
学科分类号
摘要
The Session Initiation Protocol (SIP) is a signaling communications protocol, which has been chosen for controlling multimedia communication in 3G mobile networks. The proposed authentication in SIP is HTTP digest based authentication. Recently, Tu et al. presented an improvement of Zhang et al.’s smart card-based authenticated key agreement protocol for SIP. Their scheme efficiently resists password guessing attack. However, in this paper, we analyze the security of Tu et al.’s scheme and demonstrate their scheme is still vulnerable to user’s impersonation attack, server spoofing attack and man-in-the middle attack. We aim to propose an efficient improvement on Tu et al.’s scheme to overcome the weaknesses of their scheme, while retaining the original merits of their scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against various known attacks including the attacks found in Tu et al.’s scheme. Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks including the replay and man-in-the-middle attacks. Additionally, the proposed scheme is comparable in terms of the communication and computational overheads with Tu et al.’s scheme and other related existing schemes.
引用
收藏
页码:171 / 192
页数:21
相关论文
共 50 条
  • [21] An improved smart card based authentication scheme for session initiation protocol
    Kumari, Saru
    Chaudhry, Shehzad Ashraf
    Wu, Fan
    Li, Xiong
    Farash, Mohammad Sabzinejad
    Khan, Muhammad Khurram
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 92 - 105
  • [22] An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [23] An improved smart card based authentication scheme for session initiation protocol
    Saru Kumari
    Shehzad Ashraf Chaudhry
    Fan Wu
    Xiong Li
    Mohammad Sabzinejad Farash
    Muhammad Khurram Khan
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 92 - 105
  • [24] Timestamp Based Authentication Protocol for Smart Card Using ECC
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    [J]. WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 368 - +
  • [25] A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
    Ashok Kumar Das
    [J]. Wireless Personal Communications, 2015, 82 : 1377 - 1404
  • [27] A Highly Efficient ECC-Based Authentication Protocol for RFID
    Alaoui, Hasnae Lamrani
    El Ghazi, Abdellatif
    Zbakh, Mustapha
    Touhafi, Abdellah
    Braeken, An
    [J]. JOURNAL OF SENSORS, 2021, 2021
  • [28] A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
    Li, Xiong
    Niu, Jianwei
    Bhuiyan, Md Zakirul Alam
    Wu, Fan
    Karuppiah, Marimuthu
    Kumari, Saru
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3599 - 3609
  • [29] Smart Card Based User Authentication Scheme with Anonymity
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 220 - 233
  • [30] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488