Robust and Efficient Authentication Scheme for Session Initiation Protocol
The session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many a...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2015-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2015/894549 |
id |
doaj-c301b66278bf4d98bcbdf2aa6c2482eb |
---|---|
record_format |
Article |
spelling |
doaj-c301b66278bf4d98bcbdf2aa6c2482eb2020-11-25T00:10:54ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472015-01-01201510.1155/2015/894549894549Robust and Efficient Authentication Scheme for Session Initiation ProtocolYanrong Lu0Lixiang Li1Yixian Yang2Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaThe session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.http://dx.doi.org/10.1155/2015/894549 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yanrong Lu Lixiang Li Yixian Yang |
spellingShingle |
Yanrong Lu Lixiang Li Yixian Yang Robust and Efficient Authentication Scheme for Session Initiation Protocol Mathematical Problems in Engineering |
author_facet |
Yanrong Lu Lixiang Li Yixian Yang |
author_sort |
Yanrong Lu |
title |
Robust and Efficient Authentication Scheme for Session Initiation Protocol |
title_short |
Robust and Efficient Authentication Scheme for Session Initiation Protocol |
title_full |
Robust and Efficient Authentication Scheme for Session Initiation Protocol |
title_fullStr |
Robust and Efficient Authentication Scheme for Session Initiation Protocol |
title_full_unstemmed |
Robust and Efficient Authentication Scheme for Session Initiation Protocol |
title_sort |
robust and efficient authentication scheme for session initiation protocol |
publisher |
Hindawi Limited |
series |
Mathematical Problems in Engineering |
issn |
1024-123X 1563-5147 |
publishDate |
2015-01-01 |
description |
The session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP. |
url |
http://dx.doi.org/10.1155/2015/894549 |
work_keys_str_mv |
AT yanronglu robustandefficientauthenticationschemeforsessioninitiationprotocol AT lixiangli robustandefficientauthenticationschemeforsessioninitiationprotocol AT yixianyang robustandefficientauthenticationschemeforsessioninitiationprotocol |
_version_ |
1725406391070359552 |