Security analysis and enhancements of an improved authentication for session initiation protocol with provable security

被引:0
|
作者
Mohammad Sabzinejad Farash
机构
[1] Kharazmi University,Faculty of Mathematical Sciences and Computer
来源
Peer-to-Peer Networking and Applications | 2016年 / 9卷
关键词
Password-based protocol; Elliptic curve; Session initiation protocol; Smart card; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
Very recently, Tu et al. proposed an authentication scheme for session initiation protocol using smart card to overcome the security flaws of Zhang et al.’s protocol. They claimed that their protocol is secure against known security attacks. However, in this paper, we indicate that Tu et al.’s protocol is insecure against impersonation attack. We show that an adversary can easily masquerade as a legal server to fool users. As a remedy, we also improve Tu et al.’s protocol without imposing extra computation cost. To show the security of our protocol, we prove its security in the random oracle model.
引用
收藏
页码:82 / 91
页数:9
相关论文
共 50 条
  • [31] An improved smart card based authentication scheme for session initiation protocol
    Saru Kumari
    Shehzad Ashraf Chaudhry
    Fan Wu
    Xiong Li
    Mohammad Sabzinejad Farash
    Muhammad Khurram Khan
    Peer-to-Peer Networking and Applications, 2017, 10 : 92 - 105
  • [32] Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme
    Hwang, Min-Shiang
    Yang, Hung-Wei
    Yang, Cheng-Ying
    3RD ANNUAL INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING, 2020, 719
  • [33] An improvement of authentication test for security protocol analysis
    Li, Xiangdong
    Wang, Qingxian
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 745 - 748
  • [34] Security Analysis on an Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems
    Eom, Gayeong
    Byeon, Haewon
    Choi, Younsung
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (05) : 115 - 121
  • [35] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [36] REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security
    Kumar, C. Madan
    Dwivedi, Sanjeev Kumar
    Brindha, M.
    Al-Shehari, Taher
    Alfakih, Taha
    Alsalman, Hussain
    Amin, Ruhul
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 4264 - 4285
  • [37] Security Enhancements of an Improved Timestamp-Based Remote User Authentication Scheme
    An, Younghwa
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 54 - 61
  • [38] Multidomain virtual security negotiation over the session initiation protocol (SIP)
    Martinez-Manzano, Daniel J.
    Lopez, Gabriel
    Gomez-Skarmeta, Antonio F.
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 249 - +
  • [39] An Improved Security Authentication Protocol for Lightweight RFID Based on ECC
    Wei, Guo-heng
    Qin, Yan-lin
    Fu, Wei
    JOURNAL OF SENSORS, 2022, 2022
  • [40] A method for security enhancements in AODV protocol
    Du, XJ
    Ying, W
    Ge, JH
    Wang, YM
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 237 - 240