An anonymous and secure authentication and key agreement scheme for session initiation protocol

被引:0
|
作者
Hao Lin
Fengtong Wen
Chunxia Du
机构
[1] University of Jinan,School of Mathematical Science
来源
关键词
Authentication; Session Initiation Protocol (SIP); Security attacks; User anonymity; The elliptic curve discrete logarithm problem;
D O I
暂无
中图分类号
学科分类号
摘要
In 2014, Arshad and Nikooghadam proposed an authentication and key agreement scheme for SIP to conquer the existing defects in Irshad et al.’s scheme. They claimed that their scheme resists various security attacks and has low computation cost. We found that even though Arshad et al.’s scheme achieves high efficiency, their scheme is insecure against server spoofing attacks, denial of service attacks and privilege insider attacks. Furthermore, the password change phase of their scheme is complicated and their scheme cannot provide user anonymity. To overcome the weaknesses of Arshad et al.’s scheme, we proposed an anonymous and secure authentication and key agreement protocol for SIP. Compared with Arshad et al.’s scheme, our scheme not only withstands more security attacks, but also achieves user anonymity and high efficiency.
引用
收藏
页码:2315 / 2329
页数:14
相关论文
共 50 条
  • [1] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2315 - 2329
  • [2] A provably secure anonymous authentication scheme for Session Initiation Protocol
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Irshad, Azeem
    Ashraf, Muhammad Usman
    Khan, Muhammad Khurram
    Ahmad, Hafiz Farooq
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5016 - 5027
  • [3] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Hamed Arshad
    Morteza Nikooghadam
    [J]. Multimedia Tools and Applications, 2016, 75 : 181 - 197
  • [4] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Arshad, Hamed
    Nikooghadam, Morteza
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 181 - 197
  • [5] Provably secure three-factor authentication and key agreement scheme for session initiation protocol
    Challa, Sravani
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Wu, Fan
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5412 - 5431
  • [6] A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol
    Chen, Chien-Ming
    Xiang, Bin
    Wang, King-Hang
    Yeh, Kuo-Hui
    Wu, Tsu-Yang
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [7] Robust Mutual Authentication with a Key Agreement Scheme for the Session Initiation Protocol
    Yoon, Eun-Jun
    Shin, Yong-Nyuo
    Jeon, Il-Soo
    Yoo, Kee-Young
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (03) : 203 - 213
  • [8] Secure authentication scheme for session initiation protocol
    Yang, CC
    Wang, RC
    Liu, WT
    [J]. COMPUTERS & SECURITY, 2005, 24 (05) : 381 - 386
  • [9] An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Das, Ashok Kumar
    Yoo, Kee-Young
    [J]. SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 144 - 148
  • [10] A secure and efficient mutual authentication scheme for session initiation protocol
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 449 - 459