An anonymous and secure authentication and key agreement scheme for session initiation protocol

被引:0
|
作者
Hao Lin
Fengtong Wen
Chunxia Du
机构
[1] University of Jinan,School of Mathematical Science
来源
关键词
Authentication; Session Initiation Protocol (SIP); Security attacks; User anonymity; The elliptic curve discrete logarithm problem;
D O I
暂无
中图分类号
学科分类号
摘要
In 2014, Arshad and Nikooghadam proposed an authentication and key agreement scheme for SIP to conquer the existing defects in Irshad et al.’s scheme. They claimed that their scheme resists various security attacks and has low computation cost. We found that even though Arshad et al.’s scheme achieves high efficiency, their scheme is insecure against server spoofing attacks, denial of service attacks and privilege insider attacks. Furthermore, the password change phase of their scheme is complicated and their scheme cannot provide user anonymity. To overcome the weaknesses of Arshad et al.’s scheme, we proposed an anonymous and secure authentication and key agreement protocol for SIP. Compared with Arshad et al.’s scheme, our scheme not only withstands more security attacks, but also achieves user anonymity and high efficiency.
引用
收藏
页码:2315 / 2329
页数:14
相关论文
共 50 条
  • [31] A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
    Chandrakar, Preeti
    Om, Hari
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 62 - 79
  • [32] Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
    Arshad, Hamed
    Nikooghadam, Morteza
    [J]. JOURNAL OF SUPERCOMPUTING, 2015, 71 (08): : 3163 - 3180
  • [33] Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
    Hamed Arshad
    Morteza Nikooghadam
    [J]. The Journal of Supercomputing, 2015, 71 : 3163 - 3180
  • [34] Efficient ID-based authentication and key agreement protocols for the session initiation protocol
    Kilinc, Haci Hakan
    Allaberdiyev, Yolguly
    Yanik, Tugrul
    Erdem, Serdar Suer
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) : 560 - 579
  • [35] SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
    Bhawna Narwal
    Amar Kumar Mohapatra
    [J]. Arabian Journal for Science and Engineering, 2021, 46 : 9197 - 9219
  • [36] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [37] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488
  • [38] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zezhong Zhang
    Qingqing Qi
    Neeraj Kumar
    Naveen Chilamkurti
    Hwa-Young Jeong
    [J]. Multimedia Tools and Applications, 2015, 74 : 3477 - 3488
  • [39] SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
    Narwal, Bhawna
    Mohapatra, Amar Kumar
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 9197 - 9219
  • [40] A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN
    Gupta, Ankur
    Tripathi, Meenakshi
    Sharma, Aakar
    [J]. COMPUTER COMMUNICATIONS, 2020, 160 : 311 - 325