A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography

被引:1
|
作者
Zezhong Zhang
Qingqing Qi
Neeraj Kumar
Naveen Chilamkurti
Hwa-Young Jeong
机构
[1] North China University of Water Conservancy & Electric Power,Department of Computer Science and Engineering
[2] Thapar University,Department of Computer Science and Computer Engineering
[3] La Trobe University,Humanitas College
[4] Kyung Hee University,undefined
来源
关键词
Authentication scheme; Anonymity; Elliptic curve cryptography; Session initiation protocol;
D O I
暂无
中图分类号
学科分类号
摘要
As a signaling protocol for controlling communication on the internet, establishing, maintaining, and terminating the sessions, the Session Initiation Protocol (SIP) is widely used in the world of multimedia communication. To ensure communication security, many authentication schemes for the SIP have been proposed. However, those schemes cannot ensure user privacy since they cannot provide user anonymity. To overcome weaknesses in those authentication schemes with anonymity for SIP, we propose an authentication scheme with anonymity using elliptic curve cryptograph. By a sophisticated analysis of the security of the proposed protocol, we show that the proposed scheme not only overcomes weaknesses in previous schemes but also is very efficient. Therefore, it is suitable for applications with higher security requirements.
引用
收藏
页码:3477 / 3488
页数:11
相关论文
共 50 条
  • [1] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488
  • [2] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Gupta, Vidushi
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (03) : 643 - 653
  • [3] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Vidushi Gupta
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 643 - 653
  • [4] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [5] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [6] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Mohammad Wazid
    [J]. Wireless Personal Communications, 2016, 91 : 1361 - 1391
  • [7] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    Wazid, Mohammad
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1361 - 1391
  • [8] A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    [J]. SECURITY AND PRIVACY, 2020, 3 (01):
  • [9] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    [J]. Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [10] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178