An improved smart card based authentication scheme for session initiation protocol

被引:0
|
作者
Saru Kumari
Shehzad Ashraf Chaudhry
Fan Wu
Xiong Li
Mohammad Sabzinejad Farash
Muhammad Khurram Khan
机构
[1] Ch. Charan Singh University,Department of Mathematics
[2] International Islamic University,Department of Computer Science & Software Engineering
[3] Xiamen Institute of Technology,Department of Computer Science and Engineering
[4] Hunan University of Science and Technology,School of Computer Science and Engineering
[5] Nanjing University of Information Science and Technology,Department of Mathematics and Computer Sciences
[6] Kharazmi University,Center of Excellence in Information Assurance (CoEIA)
[7] King Saud University,undefined
关键词
Authentication; Security; Anonymity and privacy; Impersonation attack; Provable security; ProVerif;
D O I
暂无
中图分类号
学科分类号
摘要
Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet Protocol based communication over public channels. SIP is inherently insecure because of underlying open text architecture. A number of solutions are proposed to boost SIP security. Very recently Farash (Peer to Peer Netw. Appl. 1–10, 2014) proposed an enhanced protocol to improve the security of Tu et al.’s protocol (Peer to Peer Netw. Appl. 1–8, 2014). Further, Farash claimed his protocol to be secure against all known attacks. However, in this paper we show that Farash’s protocol is insecure against impersonation attack, password guessing attack, lacks user anonymity and is vulnerable to session-specific temporary information attack. Further, we have proposed an upgraded protocol to enhance the security. The security and performance analysis shows that the proposed protocol reduced one point multiplication as compared with Farash’s protocol, while resisting all known attacks. We have proved the security of proposed protocol using automated tool ProVerif.
引用
收藏
页码:92 / 105
页数:13
相关论文
共 50 条
  • [41] Improvement on a Smart Card Based Password Authentication Scheme
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 405 - 409
  • [42] A smart card based remote user authentication scheme
    Centre for Development of Advanced Computing, 68, Electronic City, Bangalore, India
    不详
    不详
    J. Digit. Inf. Manage., 2008, 3 (256-261):
  • [43] Analysis and design of a smart card based authentication protocol
    Kuo-Hui Yeh
    Kuo-Yu Tsai
    Jia-Li Hou
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 909 - 917
  • [44] Advanced smart card based password authentication protocol
    Song, Ronggong
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (5-6) : 321 - 325
  • [45] Analysis and design of a smart card based authentication protocol
    Kuo-Hui YEH
    Kuo-Yu TSAI
    Jia-Li HOU
    Frontiers of Information Technology & Electronic Engineering, 2013, (12) : 909 - 917
  • [46] Analysis and design of a smart card based authentication protocol
    KuoHui YEH
    KuoYu TSAI
    JiaLi HOU
    Journal of Zhejiang University-Science C(Computers and Electronics), 2013, 14 (12) : 909 - 917
  • [47] A smart-card-based remote authentication scheme
    Chang, CC
    Lee, JS
    ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 445 - 449
  • [48] Smart card based secure password authentication scheme
    Wang, SJ
    Chang, JF
    COMPUTERS & SECURITY, 1996, 15 (03) : 231 - 237
  • [49] An Efficient and Secure Smart Card Based Authentication Scheme
    Chen, Chien-Ming
    Xiang, Bin
    Wang, King-Hang
    Zhang, Yong
    Wu, Tsu-Yang
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1113 - 1123
  • [50] Analysis and design of a smart card based authentication protocol
    Yeh, Kuo-Hui
    Tsai, Kuo-Yu
    Hou, Jia-Li
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (12): : 909 - 917