메뉴 건너뛰기




Volumn 6, Issue 3, 2013, Pages 340-350

Secure SIP authentication scheme supporting lawful interception

Author keywords

Authentication; Elliptic curve; Lawful interception; SIP; VoIP

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; INTERNET TELEPHONY; NETWORK SECURITY;

EID: 84874300958     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.568     Document Type: Article
Times cited : (11)

References (38)
  • 1
    • 84874338995 scopus 로고    scopus 로고
    • Private header (P-header) extensions to the session initiation protocol (SIP) for the 3rd-generation partnership project (3GPP). IETF RFC 3455
    • Martine M, Henrikson E, Mills D. Private header (P-header) extensions to the session initiation protocol (SIP) for the 3rd-generation partnership project (3GPP). IETF RFC 3455, 2003.
    • (2003)
    • Martine, M.1    Henrikson, E.2    Mills, D.3
  • 2
    • 84874338590 scopus 로고    scopus 로고
    • HTTP authentication: basic and digest access authentication. IETF RFC 2617
    • Franks J, Hallam-Baker P, Hostetler J, et al. HTTP authentication: basic and digest access authentication. IETF RFC 2617, 1999.
    • (1999)
    • Franks, J.1    Hallam-Baker, P.2    Hostetler, J.3
  • 3
    • 0036870280 scopus 로고    scopus 로고
    • SIP security issues: the SIP authentication procedure and its processing load
    • Salsano S, Veltri L, Papalilo D. SIP security issues: the SIP authentication procedure and its processing load. IEEE Network 2002; 16(16):38-44.
    • (2002) IEEE Network , vol.16 , Issue.16 , pp. 38-44
    • Salsano, S.1    Veltri, L.2    Papalilo, D.3
  • 5
    • 33750013256 scopus 로고    scopus 로고
    • Denial of service attacks targeting a SIP VoIP infrastructure: stack scenarios and prevention mechanisms
    • Sisalemd D, Kuthan J, Ehlerts S. Denial of service attacks targeting a SIP VoIP infrastructure: stack scenarios and prevention mechanisms. IEEE Network 2006; 20(5):26-31.
    • (2006) IEEE Network , vol.20 , Issue.5 , pp. 26-31
    • Sisalemd, D.1    Kuthan, J.2    Ehlerts, S.3
  • 6
    • 84874314221 scopus 로고    scopus 로고
    • SIP security. Security group, CH-8401
    • Andreas S, Daniel K, Andreas S. SIP security. Security group, CH-8401, 2004.
    • (2004)
    • Andreas, S.1    Daniel, K.2    Andreas, S.3
  • 7
    • 77955431593 scopus 로고    scopus 로고
    • A secure and efficient SIP authentication scheme for converged VoIP networks
    • Yoon E, Yoo K, Kim C, Hong Y, Jo M, Chen H. A secure and efficient SIP authentication scheme for converged VoIP networks. Computer Communications 2010; 33(14):1674-1681.
    • (2010) Computer Communications , vol.33 , Issue.14 , pp. 1674-1681
    • Yoon, E.1    Yoo, K.2    Kim, C.3    Hong, Y.4    Jo, M.5    Chen, H.6
  • 8
    • 84874330788 scopus 로고    scopus 로고
    • User authentication in SIP. TKK T-110.5290 seminar on Network Security, 12-11/12
    • Vesterinen P. User authentication in SIP. TKK T-110.5290 seminar on Network Security, 12-11/12, 2006.
    • (2006)
    • Vesterinen, P.1
  • 9
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • Yang C, Wang R, Liu W. Secure authentication scheme for session initiation protocol. Computer and Security 2005; 24:381-386.
    • (2005) Computer and Security , vol.24 , pp. 381-386
    • Yang, C.1    Wang, R.2    Liu, W.3
  • 10
    • 84874295227 scopus 로고    scopus 로고
    • A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. Proc. of AusCert R&D Stream;
    • Ring J, Choo K, Foo E, Looi M. A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. Proc. of AusCert R&D Stream 2006; 61-72.
    • (2006) , pp. 61-72
    • Ring, J.1    Choo, K.2    Foo, E.3    Looi, M.4
  • 11
    • 44549086712 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    • Wang F, Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communication 2008; 31:2142-2149.
    • (2008) Computer Communication , vol.31 , pp. 2142-2149
    • Wang, F.1    Zhang, Y.2
  • 12
    • 63149153148 scopus 로고    scopus 로고
    • A lightweight protection mechanism against signaling attacks in a SIP-Based VoIP environment
    • Dimitris G, Costas L. A lightweight protection mechanism against signaling attacks in a SIP-Based VoIP environment. Telecommunication Systems 2007; 36(4):153-159.
    • (2007) Telecommunication Systems , vol.36 , Issue.4 , pp. 153-159
    • Dimitris, G.1    Costas, L.2
  • 13
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • Wu L, Zhang Y, Wang F. A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standard and Interfaces 2009; 31(2):286-291.
    • (2009) Computer Standard and Interfaces , vol.31 , Issue.2 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 14
    • 74149091306 scopus 로고    scopus 로고
    • A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
    • Liao Y, Wang S. A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Computer Communications 2010; 33(3):372-380.
    • (2010) Computer Communications , vol.33 , Issue.3 , pp. 372-380
    • Liao, Y.1    Wang, S.2
  • 16
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N. Elliptic curve cryptosystem. Mathematics of Computation 1987; 48:203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 17
    • 84958760024 scopus 로고    scopus 로고
    • Elliptic curve based password authenticated key exchange protocols. Proc. of ACISP'01.;
    • Boyd C, Montague P, Nguyen K. Elliptic curve based password authenticated key exchange protocols. Proc. of ACISP'01. 2001; 487-501.
    • (2001) , pp. 487-501
    • Boyd, C.1    Montague, P.2    Nguyen, K.3
  • 18
    • 79953312656 scopus 로고    scopus 로고
    • A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication
    • Han K, Yeun C, Shon T, Park J, Kim K. A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication. International Journal of Communication Systems 2011; 24(4):461-472.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.4 , pp. 461-472
    • Han, K.1    Yeun, C.2    Shon, T.3    Park, J.4    Kim, K.5
  • 19
    • 84874315955 scopus 로고    scopus 로고
    • SIP: session initiation protocol. IETF RFC 3261
    • Rosenberg J, Schulzrinne H, Camarillo G, et al. SIP: session initiation protocol. IETF RFC 3261, 2002.
    • (2002)
    • Rosenberg, J.1    Schulzrinne, H.2    Camarillo, G.3
  • 20
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    • doi:10.1007/s11042-011-0787-0
    • Arshad R, Ikram N. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimedia Tools and Applications 2011. doi:10.1007/s11042-011-0787-0.
    • (2011) Multimedia Tools and Applications
    • Arshad, R.1    Ikram, N.2
  • 21
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols. Proc. of CT-RSA'05(LNCS 3376).;
    • Abdalla M, Pointcheval D. Simple password-based encrypted key exchange protocols. Proc. of CT-RSA'05(LNCS 3376). 2005; 191-208.
    • (2005) , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 22
    • 84874311704 scopus 로고    scopus 로고
    • Key derivation and randomness extraction.
    • Chevassut O, Fouque P, Gaudry P, Pointcheval D. Key derivation and randomness extraction. 2005, http://eprint.iacr.org/2005/061.pdf.
    • (2005)
    • Chevassut, O.1    Fouque, P.2    Gaudry, P.3    Pointcheval, D.4
  • 25
    • 29144477624 scopus 로고    scopus 로고
    • Refinements of Miller's algorithm for computing Weil/Tate pairing
    • Blake I, Murty K, Xu G. Refinements of Miller's algorithm for computing Weil/Tate pairing. Journal of Algorithms 2006; 58(2): 134-149.
    • (2006) Journal of Algorithms , vol.58 , Issue.2 , pp. 134-149
    • Blake, I.1    Murty, K.2    Xu, G.3
  • 26
    • 84874318583 scopus 로고
    • Short programs for functions on curves. Unpublished Manuscrip.
    • Miller V. Short programs for functions on curves. Unpublished Manuscrip. 1986, http://crypto.stanford.edu/miller/miller.pdf.
    • (1986)
    • Miller, V.1
  • 27
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems. Proc. of CRYPTO'02 (LNCS 2442)
    • Barreto P, Kim H, Lynn B. Efficient algorithms for pairing-based cryptosystems. Proc. of CRYPTO'02 (LNCS 2442), 2002; 354-368.
    • (2002) , pp. 354-368
    • Barreto, P.1    Kim, H.2    Lynn, B.3
  • 28
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the Tate pairing. Proc. of ANTS-V (LNCS 2369)
    • Galbraith S, Harrison K, Soldera D. Implementing the Tate pairing. Proc. of ANTS-V (LNCS 2369), 2002; 324-337.
    • (2002) , pp. 324-337
    • Galbraith, S.1    Harrison, K.2    Soldera, D.3
  • 29
    • 84874312220 scopus 로고    scopus 로고
    • 3rd Generation Partnership Project. TS 33.106: 'Lawful Interception Requirements'. V8.1.0 edn
    • 3rd Generation Partnership Project. TS 33.106: 'Lawful Interception Requirements'. V8.1.0 edn, 2008.
    • (2008)
  • 30
    • 77952524229 scopus 로고    scopus 로고
    • Robust mutual authentication with a key agreement scheme for the session initiation protocol
    • Yoon E, Shin Y, Jeon I, Yoo K. Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Technical Review 2010; 27(3):203-213.
    • (2010) IETE Technical Review , vol.27 , Issue.3 , pp. 203-213
    • Yoon, E.1    Shin, Y.2    Jeon, I.3    Yoo, K.4
  • 31
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • doi:10.1002/dac.1286
    • Xie Q. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2011. doi:10.1002/dac.1286.
    • (2011) International Journal of Communication Systems
    • Xie, Q.1
  • 33
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with applications to password-based authentication
    • Springer-Verlag
    • Abdalla M, Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password-based authentication. In Proc. of FC'05. Springer-Verlag, 2005; 341-356.
    • (2005) Proc. of FC'05 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 34
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • Springer-Verlag
    • Choo K, Boyd C, Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. In Proc. of ASIACRYPT'05. Springer-Verlag, 2005; 585-604.
    • (2005) Proc. of ASIACRYPT'05 , pp. 585-604
    • Choo, K.1    Boyd, C.2    Hitchcock, Y.3
  • 35
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer-Verlag
    • Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks. In Proc. of EUROCRYPT'00. Springer-Verlag, 2000; 139-155.
    • (2000) Proc. of EUROCRYPT'00 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 36
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • Springer-Verlag
    • Abdalla M, Bellare M, Rogaway P. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In Proc. of CT-RSA'01. Springer-Verlag, 2001; 143-158.
    • (2001) Proc. of CT-RSA'01 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 37
    • 24144444566 scopus 로고    scopus 로고
    • One-time verifier-based encrypted key exchange
    • Springer-Verlag
    • Abdalla M, Chevassut O, Pointcheval D. One-time verifier-based encrypted key exchange. In Proc. ofPKC'05. Springer-Verlag, 2005; 47-64.
    • (2005) Proc. ofPKC'05 , pp. 47-64
    • Abdalla, M.1    Chevassut, O.2    Pointcheval, D.3
  • 38
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: a new class of problems for the security of cryptographic schemes
    • Springer-Verlag
    • Okamoto T, Pointcheval D. The gap-problems: a new class of problems for the security of cryptographic schemes. In Proc. of PKC'01. Springer-Verlag, 2001; 104-118.
    • (2001) Proc. of PKC'01 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.