A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography

被引:1
|
作者
Zezhong Zhang
Qingqing Qi
Neeraj Kumar
Naveen Chilamkurti
Hwa-Young Jeong
机构
[1] North China University of Water Conservancy & Electric Power,Department of Computer Science and Engineering
[2] Thapar University,Department of Computer Science and Computer Engineering
[3] La Trobe University,Humanitas College
[4] Kyung Hee University,undefined
来源
关键词
Authentication scheme; Anonymity; Elliptic curve cryptography; Session initiation protocol;
D O I
暂无
中图分类号
学科分类号
摘要
As a signaling protocol for controlling communication on the internet, establishing, maintaining, and terminating the sessions, the Session Initiation Protocol (SIP) is widely used in the world of multimedia communication. To ensure communication security, many authentication schemes for the SIP have been proposed. However, those schemes cannot ensure user privacy since they cannot provide user anonymity. To overcome weaknesses in those authentication schemes with anonymity for SIP, we propose an authentication scheme with anonymity using elliptic curve cryptograph. By a sophisticated analysis of the security of the proposed protocol, we show that the proposed scheme not only overcomes weaknesses in previous schemes but also is very efficient. Therefore, it is suitable for applications with higher security requirements.
引用
收藏
页码:3477 / 3488
页数:11
相关论文
共 50 条
  • [21] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Zhao, Jining
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [22] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    [J]. Journal of Medical Systems, 2015, 39
  • [23] A secure and efficient mutual authentication scheme for session initiation protocol
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 449 - 459
  • [24] A provably secure anonymous authentication scheme for Session Initiation Protocol
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Irshad, Azeem
    Ashraf, Muhammad Usman
    Khan, Muhammad Khurram
    Ahmad, Hafiz Farooq
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5016 - 5027
  • [25] A secure and efficient mutual authentication scheme for session initiation protocol
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (02) : 449 - 459
  • [26] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 1801 - 1815
  • [27] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    [J]. Multimedia Tools and Applications, 2017, 76 : 1801 - 1815
  • [28] A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Zhi-Wei
    Chen, Shun-Der
    Lai, Yan-Ming
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (01) : 96 - 117
  • [29] A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
    Irshad, Azeem
    Sher, Muhammad
    Faisal, Muhammad Shahzad
    Ghani, Anwer
    Ul Hassan, Mahmood
    Ch, Shehzad Ashraf
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1210 - 1218
  • [30] On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 88 - 91