An improved and provably secure privacy preserving authentication protocol for SIP

被引:0
|
作者
Shehzad Ashraf Chaudhry
Husnain Naqvi
Muhammad Sher
Mohammad Sabzinejad Farash
Mahmood Ul Hassan
机构
[1] International Islamic University,Department of Computer Science and Software Engineering
[2] Department of Mathematics and Computer Sciences Kharazmi University,undefined
关键词
Authentication; Authenticated key agreement; Elliptic curve cryptography; Impersonation attack; Provable security; ProVerif;
D O I
暂无
中图分类号
学科分类号
摘要
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and is responsible for creating, maintaining and terminating sessions. To guarantee secure SIP based communication, a number of authentication schemes are proposed, typically most of these are based on smart card due to its temper resistance property. Recently Zhang et al. presented an authenticated key agreement scheme for SIP based on elliptic curve cryptography. However Tu et al. (Peer to Peer Netw. Appl 1–8, 2014) finds their scheme to be insecure against user impersonation attack, furthermore they presented an improved scheme and claimed it to be secure against all known attacks. Very recently Farash (Peer to Peer Netw. Appl 1–10, 2014) points out that Tu et al.’s scheme is vulnerable to server impersonation attack, Farash also proposed an improvement on Tu et al.’s scheme. However, our analysis in this paper shows that Tu et al.’s scheme is insecure against server impersonation attack. Further both Tu et al.’s scheme and Farash’s improvement do not protect user’s privacy and are vulnerable to replay and denial of services attacks. In order to cope with these limitations, we have proposed a privacy preserving improved authentication scheme based on ECC. The proposed scheme provides mutual authentication as well as resists all known attacks as mentioned by Tu et al. and Farash.
引用
收藏
页码:1 / 15
页数:14
相关论文
共 50 条
  • [21] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Qi Xie
    Keheng Li
    Xiao Tan
    Lidong Han
    Wen Tang
    Bin Hu
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [22] Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network
    Amir, Nur Afiqah Suzelan
    Othman, Wan Ainun Mior
    Wong, Kok Bin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (05): : 1450 - 1470
  • [23] A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
    Garima Singh
    Deepti Shrimankar
    Sādhanā, 2018, 43
  • [24] Efficient provably-secure privacy-preserving signature-based key establishment protocol
    Abbasinezhad-Mood, Dariush
    Ostad-Sharif, Arezou
    Nikooghadam, Morteza
    AD HOC NETWORKS, 2020, 100
  • [25] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [26] Provably secure fog-based authentication protocol for VANETs
    Awais, Syed Muhammad
    Yucheng, Wu
    Mahmood, Khalid
    Badar, Hafiz Muhammad Sanaullah
    Kharel, Rupak
    Das, Ashok Kumar
    COMPUTER NETWORKS, 2024, 246
  • [27] A provably secure anonymous authentication scheme for Session Initiation Protocol
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Irshad, Azeem
    Ashraf, Muhammad Usman
    Khan, Muhammad Khurram
    Ahmad, Hafiz Farooq
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5016 - 5027
  • [28] A provably secure group authentication protocol for various LTE networks
    Kijjabuncha, Boriphat
    Hiranvanichakorn, Pipat
    International Journal of Network Security, 2019, 21 (06): : 957 - 970
  • [29] Provably Secure Access Authentication Protocol under Universal Network
    Zheng, Lijuan
    Han, Zhen
    Zhang, Rui
    Fan, Tongrang
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 3, 2009, : 371 - +
  • [30] Fast privacy preserving RFID authentication protocol
    Zhai, Li
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (12): : 3215 - 3222