An Anonymous and Efficient ECC-Based Authentication Scheme for SIP

被引:2
|
作者
Zhou, Yousheng [1 ,2 ]
Chen, Xinyun [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
KEY AGREEMENT;
D O I
10.1155/2020/8886585
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session initiation protocol (SIP), a widely used signal protocol for controlling multimedia communication sessions, is under numerous attacks when performing the authentication steps between the user and server. So secure authentication schemes are needed to be presented for SIP. Recently, Arshad et al. advanced novel schemes for SIP using elliptic curve cryptography (ECC) and claimed their schemes can resist various attacks. However, Lu et al. found that Arshad et al.'s scheme cannot resist trace and key-compromise impersonation attacks; hence, it cannot provide proper mutual authentication. Meanwhile, an enhanced scheme was advanced by Lu et al. and they stated that their scheme can stand up to possible known attacks. Nevertheless, in this paper, we conclude that Arshad and Nikooghadam's scheme is insecure against impersonation attack and Lu et al.'s scheme is still vulnerable to impersonation attack. To overcome these weaknesses of their schemes, we present a novel anonymous ECC-based scheme for SIP. Security analysis and performance analysis show that our proposed scheme can resist various known attacks and efficient in the meantime.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A Secure and Efficient ECC-Based Anonymous Authentication Protocol
    Wang, Feifei
    Xu, Guoai
    Gu, Lize
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [2] Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (04): : 3086 - 3104
  • [3] Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
    Mahdi Nikooghadam
    Haleh Amintoosi
    The Journal of Supercomputing, 2020, 76 : 3086 - 3104
  • [4] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75
  • [5] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [6] Ring signature scheme for ECC-based anonymous signcryption
    Chung, Yu Fang
    Wu, Zhen Yu
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 669 - 674
  • [7] Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    SENSORS, 2025, 25 (01)
  • [8] On the Security of an ECC-Based Authentication Scheme for Internet of Drones
    Zhang, Min
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6425 - 6428
  • [9] A Traceable and Anonymous Authentication Scheme Based on ECC
    YIN Fengmei
    HOU Zhengfeng
    WU Hao
    WuhanUniversityJournalofNaturalSciences, 2020, 25 (06) : 521 - 526
  • [10] An Untraceable ECC-Based Remote User Authentication Scheme
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Albeshri, Aiiad
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03): : 1742 - 1760