Robust and Efficient Authentication Scheme for Session Initiation Protocol

The session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many a...

Full description

Bibliographic Details
Main Authors: Yanrong Lu, Lixiang Li, Yixian Yang
Format: Article
Language:English
Published: Hindawi Limited 2015-01-01
Series:Mathematical Problems in Engineering
Online Access:http://dx.doi.org/10.1155/2015/894549
id doaj-c301b66278bf4d98bcbdf2aa6c2482eb
record_format Article
spelling doaj-c301b66278bf4d98bcbdf2aa6c2482eb2020-11-25T00:10:54ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472015-01-01201510.1155/2015/894549894549Robust and Efficient Authentication Scheme for Session Initiation ProtocolYanrong Lu0Lixiang Li1Yixian Yang2Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaThe session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.http://dx.doi.org/10.1155/2015/894549
collection DOAJ
language English
format Article
sources DOAJ
author Yanrong Lu
Lixiang Li
Yixian Yang
spellingShingle Yanrong Lu
Lixiang Li
Yixian Yang
Robust and Efficient Authentication Scheme for Session Initiation Protocol
Mathematical Problems in Engineering
author_facet Yanrong Lu
Lixiang Li
Yixian Yang
author_sort Yanrong Lu
title Robust and Efficient Authentication Scheme for Session Initiation Protocol
title_short Robust and Efficient Authentication Scheme for Session Initiation Protocol
title_full Robust and Efficient Authentication Scheme for Session Initiation Protocol
title_fullStr Robust and Efficient Authentication Scheme for Session Initiation Protocol
title_full_unstemmed Robust and Efficient Authentication Scheme for Session Initiation Protocol
title_sort robust and efficient authentication scheme for session initiation protocol
publisher Hindawi Limited
series Mathematical Problems in Engineering
issn 1024-123X
1563-5147
publishDate 2015-01-01
description The session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.
url http://dx.doi.org/10.1155/2015/894549
work_keys_str_mv AT yanronglu robustandefficientauthenticationschemeforsessioninitiationprotocol
AT lixiangli robustandefficientauthenticationschemeforsessioninitiationprotocol
AT yixianyang robustandefficientauthenticationschemeforsessioninitiationprotocol
_version_ 1725406391070359552