An improved and provably secure privacy preserving authentication protocol for SIP

被引:0
|
作者
Shehzad Ashraf Chaudhry
Husnain Naqvi
Muhammad Sher
Mohammad Sabzinejad Farash
Mahmood Ul Hassan
机构
[1] International Islamic University,Department of Computer Science and Software Engineering
[2] Department of Mathematics and Computer Sciences Kharazmi University,undefined
关键词
Authentication; Authenticated key agreement; Elliptic curve cryptography; Impersonation attack; Provable security; ProVerif;
D O I
暂无
中图分类号
学科分类号
摘要
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and is responsible for creating, maintaining and terminating sessions. To guarantee secure SIP based communication, a number of authentication schemes are proposed, typically most of these are based on smart card due to its temper resistance property. Recently Zhang et al. presented an authenticated key agreement scheme for SIP based on elliptic curve cryptography. However Tu et al. (Peer to Peer Netw. Appl 1–8, 2014) finds their scheme to be insecure against user impersonation attack, furthermore they presented an improved scheme and claimed it to be secure against all known attacks. Very recently Farash (Peer to Peer Netw. Appl 1–10, 2014) points out that Tu et al.’s scheme is vulnerable to server impersonation attack, Farash also proposed an improvement on Tu et al.’s scheme. However, our analysis in this paper shows that Tu et al.’s scheme is insecure against server impersonation attack. Further both Tu et al.’s scheme and Farash’s improvement do not protect user’s privacy and are vulnerable to replay and denial of services attacks. In order to cope with these limitations, we have proposed a privacy preserving improved authentication scheme based on ECC. The proposed scheme provides mutual authentication as well as resists all known attacks as mentioned by Tu et al. and Farash.
引用
收藏
页码:1 / 15
页数:14
相关论文
共 50 条
  • [31] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Diksha Rangwani
    Dipanwita Sadhukhan
    Sangram Ray
    Muhammad Khurram Khan
    Mou Dasgupta
    Peer-to-Peer Networking and Applications, 2021, 14 : 1548 - 1571
  • [32] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Xu, Dongqing
    Zhang, Shu
    Chen, Jianhua
    Ma, Mimi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 837 - 847
  • [33] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Dongqing Xu
    Shu Zhang
    Jianhua Chen
    Mimi Ma
    Peer-to-Peer Networking and Applications, 2018, 11 : 837 - 847
  • [34] Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City
    Othman, Wajdy
    Miao Fuyou
    Xue, Kaiping
    Hawbani, Ammar
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (12) : 12902 - 12917
  • [35] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Rangwani, Diksha
    Sadhukhan, Dipanwita
    Ray, Sangram
    Khan, Muhammad Khurram
    Dasgupta, Mou
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1548 - 1571
  • [36] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
    Nyangaresi, Vincent Omollo
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):
  • [37] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914
  • [38] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [39] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [40] Design of Provably Secure and Lightweight Authentication Protocol for Unmanned Aerial Vehicle
    Shariq, Mohd
    Conti, Mauro
    Singh, Karan
    Dwivedi, Sanjeev Kumar
    Abdussami, Mohammad
    Amin, Ruhul
    Masud, Mehedi
    COMPUTER COMMUNICATIONS, 2024, 228