An improved smart card based authentication scheme for session initiation protocol

被引:0
|
作者
Saru Kumari
Shehzad Ashraf Chaudhry
Fan Wu
Xiong Li
Mohammad Sabzinejad Farash
Muhammad Khurram Khan
机构
[1] Ch. Charan Singh University,Department of Mathematics
[2] International Islamic University,Department of Computer Science & Software Engineering
[3] Xiamen Institute of Technology,Department of Computer Science and Engineering
[4] Hunan University of Science and Technology,School of Computer Science and Engineering
[5] Nanjing University of Information Science and Technology,Department of Mathematics and Computer Sciences
[6] Kharazmi University,Center of Excellence in Information Assurance (CoEIA)
[7] King Saud University,undefined
关键词
Authentication; Security; Anonymity and privacy; Impersonation attack; Provable security; ProVerif;
D O I
暂无
中图分类号
学科分类号
摘要
Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet Protocol based communication over public channels. SIP is inherently insecure because of underlying open text architecture. A number of solutions are proposed to boost SIP security. Very recently Farash (Peer to Peer Netw. Appl. 1–10, 2014) proposed an enhanced protocol to improve the security of Tu et al.’s protocol (Peer to Peer Netw. Appl. 1–8, 2014). Further, Farash claimed his protocol to be secure against all known attacks. However, in this paper we show that Farash’s protocol is insecure against impersonation attack, password guessing attack, lacks user anonymity and is vulnerable to session-specific temporary information attack. Further, we have proposed an upgraded protocol to enhance the security. The security and performance analysis shows that the proposed protocol reduced one point multiplication as compared with Farash’s protocol, while resisting all known attacks. We have proved the security of proposed protocol using automated tool ProVerif.
引用
收藏
页码:92 / 105
页数:13
相关论文
共 50 条
  • [21] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [22] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [23] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [24] A secure and efficient mutual authentication scheme for session initiation protocol
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    Peer-to-Peer Networking and Applications, 2016, 9 : 449 - 459
  • [25] A provably secure anonymous authentication scheme for Session Initiation Protocol
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Irshad, Azeem
    Ashraf, Muhammad Usman
    Khan, Muhammad Khurram
    Ahmad, Hafiz Farooq
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5016 - 5027
  • [26] A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (01) : 171 - 192
  • [27] A secure and efficient mutual authentication scheme for session initiation protocol
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (02) : 449 - 459
  • [28] A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Peer-to-Peer Networking and Applications, 2016, 9 : 171 - 192
  • [29] Robust password and smart card based authentication scheme with smart card revocation
    Xie Q.
    Liu W.-H.
    Wang S.-B.
    Hu B.
    Dong N.
    Yu X.-Y.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 418 - 424
  • [30] Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
    谢琪
    刘文浩
    王圣宝
    胡斌
    董娜
    于秀源
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 418 - 424