An improved smart card based authentication scheme for session initiation protocol

被引:0
|
作者
Saru Kumari
Shehzad Ashraf Chaudhry
Fan Wu
Xiong Li
Mohammad Sabzinejad Farash
Muhammad Khurram Khan
机构
[1] Ch. Charan Singh University,Department of Mathematics
[2] International Islamic University,Department of Computer Science & Software Engineering
[3] Xiamen Institute of Technology,Department of Computer Science and Engineering
[4] Hunan University of Science and Technology,School of Computer Science and Engineering
[5] Nanjing University of Information Science and Technology,Department of Mathematics and Computer Sciences
[6] Kharazmi University,Center of Excellence in Information Assurance (CoEIA)
[7] King Saud University,undefined
关键词
Authentication; Security; Anonymity and privacy; Impersonation attack; Provable security; ProVerif;
D O I
暂无
中图分类号
学科分类号
摘要
Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet Protocol based communication over public channels. SIP is inherently insecure because of underlying open text architecture. A number of solutions are proposed to boost SIP security. Very recently Farash (Peer to Peer Netw. Appl. 1–10, 2014) proposed an enhanced protocol to improve the security of Tu et al.’s protocol (Peer to Peer Netw. Appl. 1–8, 2014). Further, Farash claimed his protocol to be secure against all known attacks. However, in this paper we show that Farash’s protocol is insecure against impersonation attack, password guessing attack, lacks user anonymity and is vulnerable to session-specific temporary information attack. Further, we have proposed an upgraded protocol to enhance the security. The security and performance analysis shows that the proposed protocol reduced one point multiplication as compared with Farash’s protocol, while resisting all known attacks. We have proved the security of proposed protocol using automated tool ProVerif.
引用
收藏
页码:92 / 105
页数:13
相关论文
共 50 条
  • [1] An improved smart card based authentication scheme for session initiation protocol
    Kumari, Saru
    Chaudhry, Shehzad Ashraf
    Wu, Fan
    Li, Xiong
    Farash, Mohammad Sabzinejad
    Khan, Muhammad Khurram
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 92 - 105
  • [2] An improved authentication protocol for session initiation protocol using smart card
    Tu, Hang
    Kumar, Neeraj
    Chilamkurti, Naveen
    Rho, Seungmin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (05) : 903 - 910
  • [3] An improved authentication protocol for session initiation protocol using smart card
    Hang Tu
    Neeraj Kumar
    Naveen Chilamkurti
    Seungmin Rho
    Peer-to-Peer Networking and Applications, 2015, 8 : 903 - 910
  • [4] An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
    Wu, Kan
    Gong, Peng
    Wang, Jiantao
    Yan, Xiaopeng
    Li, Ping
    ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2013, 16 (04): : 324 - 335
  • [5] Enhanced authentication protocol for session initiation protocol using smart card
    Zhu, Wenxia
    Chen, Jianhua
    He, Debiao
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (04) : 330 - 342
  • [6] An improved and efficient mutual authentication scheme for session initiation protocol
    Zhang, Yuanyuan
    Xie, Kunming
    Ruan, Ou
    PLOS ONE, 2019, 14 (03):
  • [7] Biometrics based authentication scheme for session initiation protocol
    Xie, Qi
    Tang, Zhixiong
    SPRINGERPLUS, 2016, 5
  • [8] An improved password-based authentication scheme for session initiation protocol using smart cards without verification table
    Farash, Mohammad Sabsinejad
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [9] A New Authentication Scheme For Session Initiation Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 549 - +
  • [10] Secure authentication scheme for session initiation protocol
    Yang, CC
    Wang, RC
    Liu, WT
    COMPUTERS & SECURITY, 2005, 24 (05) : 381 - 386