Security analysis and enhancements of an improved authentication for session initiation protocol with provable security

被引:0
|
作者
Mohammad Sabzinejad Farash
机构
[1] Kharazmi University,Faculty of Mathematical Sciences and Computer
来源
Peer-to-Peer Networking and Applications | 2016年 / 9卷
关键词
Password-based protocol; Elliptic curve; Session initiation protocol; Smart card; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
Very recently, Tu et al. proposed an authentication scheme for session initiation protocol using smart card to overcome the security flaws of Zhang et al.’s protocol. They claimed that their protocol is secure against known security attacks. However, in this paper, we indicate that Tu et al.’s protocol is insecure against impersonation attack. We show that an adversary can easily masquerade as a legal server to fool users. As a remedy, we also improve Tu et al.’s protocol without imposing extra computation cost. To show the security of our protocol, we prove its security in the random oracle model.
引用
收藏
页码:82 / 91
页数:9
相关论文
共 50 条
  • [11] Security Testing of Session Initiation Protocol Implementations
    Harris, Ian G.
    Alrahem, Thoulfekar
    Chen, Alex
    DiGiuseppe, Nick
    Gee, Jefferey
    Hsiao, Shang-Pin
    Mattox, Sean
    Park, Taejoon
    Selvaraj, Saravanan
    Tam, Albert
    Carlsson, Marcel
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 91 - 103
  • [12] SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL
    Geneiatakis, Dimitris
    Dagiuklas, Tasos
    Kambourakis, Georgios
    Lambrinoudakis, Costas
    Gritzalis, Stefanos
    Ehlert, Sven
    Sisalem, Dorgham
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03): : 68 - 81
  • [13] Security analysis and enhancements of 3GPP authentication and key agreement protocol
    Zhang, MX
    Fang, YG
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2005, 4 (02) : 734 - 742
  • [14] Security Analysis and Enhancements of a User Authentication Scheme
    Liu, Wan-Rong
    He, Xin
    Ji, Zhi-Yong
    International Journal of Network Security, 2021, 23 (05): : 895 - 903
  • [15] Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security"
    Xu, Meijia
    Dong, Qiying
    Zhou, Mai
    Wang, Chenyu
    Liu, Yangyang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [16] Research on a provable security RFID authentication protocol based on Hash function
    Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
  • [17] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, 23 (02) : 31 - 37
  • [18] A Security-provable Authentication and Key Agreement Protocol in RFID System
    He Lei
    Gan Yong
    Li Na-Na
    Cai Zeng-Yu
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2078 - 2080
  • [19] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [20] Security analysis and enhancements of an improved multi-factor biometric authentication scheme
    Park, YoHan
    Park, KiSung
    Lee, KyungKeun
    Song, Hwangjun
    Park, YoungHo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08):