메뉴 건너뛰기




Volumn 119 CCIS, Issue PART 1, 2010, Pages 46-55

A secured authentication protocol for SIP using elliptic curves cryptography

Author keywords

Authentication; ECC; HTTP Digest authentication; Session Initiation Protocol; Voice over Internet Protocol

Indexed keywords

AUTHENTICATION MECHANISMS; AUTHENTICATION PROTOCOLS; DIFFIE HELLMAN; ECC; ELLIPTIC CURVES CRYPTOGRAPHY; GUESSING ATTACKS; HTTP DIGEST AUTHENTICATION; INSIDER ATTACK; PASSWORD GUESSING ATTACK; SECURITY ANALYSIS; SECURITY REQUIREMENTS; SESSION INITIATION PROTOCOL; SESSION INITIATION PROTOCOLS; SPOOFING ATTACKS; TRANSPORT PROTOCOLS; VOICE OVER INTERNET PROTOCOL;

EID: 78651081750     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-17587-9_6     Document Type: Conference Paper
Times cited : (20)

References (42)
  • 3
    • 0036870280 scopus 로고    scopus 로고
    • Sip Security Issues: The Sip Authentication Procedure and Its Processing Load
    • Salsano, S. , Veltri, L. , Papalilo, D. : Sip Security Issues: The Sip Authentication Procedure and Its Processing Load. Network 16, 38-44 (2002)
    • (2002) Network , vol.16 , pp. 38-44
    • Salsano, S.1    Veltri, L.2    Papalilo, D.3
  • 6
    • 33750013256 scopus 로고    scopus 로고
    • Denial of Service Attacks Targeting a Sip Voip Infrastructure: Stack Scenarios and Prevention Mechanisms
    • Sisalemd, D. , Kuthan, J. , Ehlerts, S. : Denial of Service Attacks Targeting a Sip Voip Infrastructure: Stack Scenarios and Prevention Mechanisms. Network IEEE 20(5), 26-31 (2006)
    • (2006) Network IEEE , vol.20 , Issue.5 , pp. 26-31
    • Sisalemd, D.1    Kuthan, J.2    Ehlerts, S.3
  • 7
    • 24344457092 scopus 로고    scopus 로고
    • Secure Authentication Scheme for Session Initiation Protocol
    • Yang, C.-C. , Wang, R.-C. , Liu, W.-T. : Secure Authentication Scheme for Session Initiation Protocol. Comput Secur. 24, 381-386 (2005)
    • (2005) Comput Secur. , vol.24 , pp. 381-386
    • Yang, C.-C.1    Wang, R.-C.2    Liu, W.-T.3
  • 9
    • 78651068514 scopus 로고    scopus 로고
    • 2005: Proceedings of World Academy of Science. Engineering And Technology (October
    • Durlanik, A. , Sogukpinar, I. : Sip Authentication Scheme Using Ecdh. In: 2005: Proceedings of World Academy of Science. Engineering And Technology (October 2005)
    • (2005) Sip Authentication Scheme Using Ecdh
    • Durlanik, A.1    Sogukpinar, I.2
  • 10
    • 33751060286 scopus 로고    scopus 로고
    • A Lightweight Scheme for Securely and Reliably Locating Sip Users VoIP Management and Security
    • Kong, L. , Balasubramaniyan, V. B. , Ahamad, M. : A Lightweight Scheme for Securely and Reliably Locating Sip Users. In: VoIP Management and Security, IEEE Workshop, pp. 9-17 (2006)
    • (2006) IEEE Workshop , pp. 9-17
    • Kong, L.1    Balasubramaniyan, V.B.2    Ahamad, M.3
  • 11
    • 44549088249 scopus 로고    scopus 로고
    • A New Authentication Mechanism and Key Agreement Protocol for Sip Using Identity Based Cryptography
    • Ring, J. , Raymond Choo, K.-K. , Foo, E. , Looi, M. : A New Authentication Mechanism and Key Agreement Protocol for Sip Using Identity Based Cryptography. In: Proceedings of AusCERT R&D Stream, pp. 61-72 (2006)
    • (2006) Proceedings of AusCERT R&D Stream , pp. 61-72
    • Ring, J.1    Raymond Choo, K.-K.2    Foo, E.3    Looi, M.4
  • 15
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Blakely, G. R. , Chaum, D. (eds. ), Springer, Heidelberg
    • Shamir, A. : Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G. R. , Chaum, D. (eds. ) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984. LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 16
    • 46849100481 scopus 로고    scopus 로고
    • A Scalable Key Management and Clustering Scheme for Wireless Ad Hoc and Sensor Networks
    • Li, J. H. , Bhattacharjee, B. , Yu, M. , Levy, R. : A Scalable Key Management and Clustering Scheme for Wireless Ad Hoc and Sensor Networks. Future Gener. Comp. Sy. 24, 860-869 (2008)
    • (2008) Future Gener. Comp. Sy. , vol.24 , pp. 860-869
    • Li, J.H.1    Bhattacharjee, B.2    Yu, M.3    Levy, R.4
  • 17
    • 84942246351 scopus 로고    scopus 로고
    • Identity Based Authenticated Key Agreement Protocol from Pairings
    • IEEE Computer Society Press, Los Alamitos
    • Chen, L. , Kudla, C. : Identity Based Authenticated Key Agreement Protocol from Pairings. In: CSFW 2003, pp. 213-219. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) CSFW 2003 , pp. 213-219
    • Chen, L.1    Kudla, C.2
  • 18
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
    • Biham, E. (ed. ) , Springer, Heidelberg
    • Boneh, D. , Gentry, C. , Lynn, B. , Shacham, H. : Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed. ) EUROCRYPT 2003. LNCS, vol. 2656, Springer, Heidelberg (2003)
    • (2003) EUROCRYPT 2003. LNCS , vol.2656
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 19
    • 46849089265 scopus 로고    scopus 로고
    • Access Control Management for Ubiquitous Computing
    • Wang, H. , Zhang, Y. , Cao, J. : Access Control Management for Ubiquitous Computing. Future Gener. Comp. Sy. 24, 870-878 (2008)
    • (2008) Future Gener. Comp. Sy. , vol.24 , pp. 870-878
    • Wang, H.1    Zhang, Y.2    Cao, J.3
  • 20
    • 67349189496 scopus 로고    scopus 로고
    • A Secure Credit-Based Cooperation Stimulating Mechanism for Manets Using Hash Chains
    • Janzadeh, H. , Fayazbakhsh, K. , Dehghan, M. , Fallah, M. S. : A Secure Credit-Based Cooperation Stimulating Mechanism for Manets Using Hash Chains. Future Gener. Comp. Sy. 25, 926-934 (2009)
    • (2009) Future Gener. Comp. Sy. , vol.25 , pp. 926-934
    • Janzadeh, H.1    Fayazbakhsh, K.2    Dehghan, M.3    Fallah, M.S.4
  • 21
    • 44549086712 scopus 로고    scopus 로고
    • A New Provably Secure Authentication and Key Agreement Mechanism for Sip Using Certificateless Public-Key Cryptography
    • Wang, F. , Zhang, Y. : A New Provably Secure Authentication and Key Agreement Mechanism for Sip Using Certificateless Public-Key Cryptography. Computer Communications 31, 2142-2149 (2008)
    • (2008) Computer Communications , vol.31 , pp. 2142-2149
    • Wang, F.1    Zhang, Y.2
  • 22
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless Public Key Cryptography
    • Laih, C.-S. (ed. ) , Springer, Heidelberg
    • Al-Riyami, S. S. , Paterson, K. G. : Certificateless Public Key Cryptography. In: Laih, C.-S. (ed. ) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
    • (2003) ASIACRYPT 2003. LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 23
    • 78651063942 scopus 로고    scopus 로고
    • Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol
    • Tsai, J.-L. : Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol. International Journal of Network Security 9(1), 12-16 (2009)
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 12-16
    • Tsai, J.-L.1
  • 24
    • 76349090342 scopus 로고    scopus 로고
    • On Security of an Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol
    • Lee, C. C. : On Security of an Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol. International Journal of Network Security 9, 201-203 (2009)
    • (2009) International Journal of Network Security , vol.9 , pp. 201-203
    • Lee, C.C.1
  • 25
    • 77957937072 scopus 로고    scopus 로고
    • Security Improvement on a Remote User Authentication Scheme Using Smart Cards
    • Bandyopadhyay, S. K. , Adi, W. , Kim, T.-h. , Xiao, Y. (eds. ), Springer, Heidelberg
    • Chen, T.-H. , Hsiang, H.-C. , Shih, W.-K. : Security Improvement on a Remote User Authentication Scheme Using Smart Cards. In: Bandyopadhyay, S. K. , Adi, W. , Kim, T.-h. , Xiao, Y. (eds. ) ISA 2010. Communications in Computer and Information Science, vol. 76, pp. 9-16. Springer, Heidelberg (2010)
    • (2010) ISA 2010. Communications in Computer and Information Science , vol.76 , pp. 9-16
    • Chen, T.-H.1    Hsiang, H.-C.2    Shih, W.-K.3
  • 26
    • 0034140374 scopus 로고    scopus 로고
    • A New Remote User Authentication Scheme Using Smart Cards
    • Hwang, M. S. , Li, L. H. : A New Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 46, 28-30 (2000)
    • (2000) IEEE T. Consum. Electr. , vol.46 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 27
    • 4043152192 scopus 로고    scopus 로고
    • Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
    • Yoon, E. J. , Ryu, E. K. , Yoo, K. Y. : Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 50, 612-614 (2004)
    • (2004) IEEE T. Consum. Electr. , vol.50 , pp. 612-614
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3
  • 28
    • 4043087111 scopus 로고    scopus 로고
    • Improved Efficient Remote User Authentication Scheme Using Smart Cards
    • Lee, S. W. , Kim, H. S. , Yoo, K. Y. : Improved Efficient Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 50, 565-567 (2004)
    • (2004) IEEE T. Consum. Electr. , vol.50 , pp. 565-567
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 29
    • 78049329614 scopus 로고    scopus 로고
    • Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards
    • in press, Accepted Manuscript doi:10. 1016/j. future. 2010. 08. 007
    • Chen, T. H. , Hsiang, H. C. , Shih, W. K. : Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards. In: Future Gener. Comp. System, (in press) Accepted Manuscript doi:10. 1016/j. future. 2010. 08. 007
    • Future Gener. Comp. System
    • Chen, T.H.1    Hsiang, H.C.2    Shih, W.K.3
  • 32
    • 0003487140 scopus 로고    scopus 로고
    • I. T Union, Recommendation H. 323, Telecommunication Standardization Sector of Itu, Geneva, Switzerland ,Febuary
    • I. T Union, Packet Based Multimedia Communication Systems, in: Recommendation H. 323, Telecommunication Standardization Sector of Itu, Geneva, Switzerland (Febuary 1998)
    • (1998) Packet Based Multimedia Communication Systems
  • 34
    • 55749113850 scopus 로고    scopus 로고
    • A New Provably Secure Authentication and Key Agreement Protocol for Sip Using Ecc
    • Wu, L. , Zhang, Y. , Wang, F. : A New Provably Secure Authentication and Key Agreement Protocol for Sip Using Ecc. Computer Standards & Interfaces 31, 286-291 (2009)
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 35
    • 78049334450 scopus 로고    scopus 로고
    • A Robust Mutual Authentication Protocol for Wireless Sensor Networks
    • to be published.
    • Chen, T.-H. , Shih, W. K. : A Robust Mutual Authentication Protocol for Wireless Sensor Networks. ETRI Journal 32 (2010 to be published. )
    • (2010) ETRI Journal , vol.32
    • Chen, T.-H.1    Shih, W.K.2
  • 38
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • Williams, H. C. (ed. ) , Springer, Heidelberg
    • Miller, V. S. : Use of Elliptic Curves in Cryptography. In: Williams, H. C. (ed. ) CRYPTO 1985. LNCS, vol. 218, p. 417. Springer, Heidelberg (1986)
    • (1986) CRYPTO 1985. LNCS , vol.218 , pp. 417
    • Miller, V.S.1
  • 39
    • 17644373459 scopus 로고    scopus 로고
    • Authentication Primitives for Secure Protocol Specifications
    • Bodei, C. , Degano, P. , Focardi, R. , Priami, C. : Authentication Primitives for Secure Protocol Specifications. Future Gener. Comp. Sy. 21, 645-653 (2005)
    • (2005) Future Gener. Comp. Sy. , vol.21 , pp. 645-653
    • Bodei, C.1    Degano, P.2    Focardi, R.3    Priami, C.4
  • 40
    • 0037211327 scopus 로고    scopus 로고
    • A New Remote User Authentication Scheme for Multi-Server Architecture
    • Lin, I.-C. , Hwang, M.-S. , Li, L.-H. : A New Remote User Authentication Scheme for Multi-Server Architecture. Future Gener. Comp. Sy. 19, 13-22 (2003)
    • (2003) Future Gener. Comp. Sy. , vol.19 , pp. 13-22
    • Lin, I.-C.1    Hwang, M.-S.2    Li, L.-H.3
  • 42
    • 0742324846 scopus 로고    scopus 로고
    • Design and Implementation of Secure E-Mail System Using Elliptic Curve Cryptosystem
    • Lee, W. , Lee, J. : Design and Implementation of Secure E-Mail System Using Elliptic Curve Cryptosystem. Future Gener. Comp. Sy. 20, 315-326 (2004)
    • (2004) Future Gener. Comp. Sy. , vol.20 , pp. 315-326
    • Lee, W.1    Lee, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.