An Anonymous and Efficient ECC-Based Authentication Scheme for SIP

被引:2
|
作者
Zhou, Yousheng [1 ,2 ]
Chen, Xinyun [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
KEY AGREEMENT;
D O I
10.1155/2020/8886585
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session initiation protocol (SIP), a widely used signal protocol for controlling multimedia communication sessions, is under numerous attacks when performing the authentication steps between the user and server. So secure authentication schemes are needed to be presented for SIP. Recently, Arshad et al. advanced novel schemes for SIP using elliptic curve cryptography (ECC) and claimed their schemes can resist various attacks. However, Lu et al. found that Arshad et al.'s scheme cannot resist trace and key-compromise impersonation attacks; hence, it cannot provide proper mutual authentication. Meanwhile, an enhanced scheme was advanced by Lu et al. and they stated that their scheme can stand up to possible known attacks. Nevertheless, in this paper, we conclude that Arshad and Nikooghadam's scheme is insecure against impersonation attack and Lu et al.'s scheme is still vulnerable to impersonation attack. To overcome these weaknesses of their schemes, we present a novel anonymous ECC-based scheme for SIP. Security analysis and performance analysis show that our proposed scheme can resist various known attacks and efficient in the meantime.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] A provably secure ECC-based roaming authentication scheme for global mobility networks
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    Kumari, Saru
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54 (54)
  • [32] A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
    Kumari, Saru
    Renuka, Km.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (03)
  • [33] A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Lee, Youngsook
    Won, Dongho
    SENSORS, 2014, 14 (11): : 21023 - 21044
  • [34] An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (10) : 7996 - 8004
  • [35] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejia
    Seys, Stefaan
    Singelee, Dave
    Verbanwhede, Ingrid
    RFID SECURITY AND PRIVACY, 2012, 7055 : 183 - 201
  • [36] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [37] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201
  • [38] A Symbolic Analysis of ECC-based Direct Anonymous Attestation
    Whitefield, Jorden
    Chen, Liqun
    Sasse, Ralf
    Schneider, Steve
    Treharne, Helen
    Wesemeyer, Stephan
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 127 - 141
  • [39] A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
    AlMajed, Hisham
    AlMogren, Ahmad
    SENSORS, 2020, 20 (21) : 1 - 31
  • [40] An Efficient ECC-Based CP-ABE Scheme for Power IoT
    Cheng, Rui
    Wu, Kehe
    Su, Yuling
    Li, Wei
    Cui, Wenchao
    Tong, Jie
    PROCESSES, 2021, 9 (07)