메뉴 건너뛰기




Volumn 74, Issue 11, 2015, Pages 3967-3984

A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card

Author keywords

Authentication; Security; Session initiation protocol; Smart card; Voice over Internet Protocol

Indexed keywords

AUTHENTICATION; DENIAL-OF-SERVICE ATTACK; INTERNET; INTERNET TELEPHONY; MOBILE SECURITY; SMART CARDS; TELECOMMUNICATION TRAFFIC; TRANSPORTATION; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 84929842561     PISSN: 13807501     EISSN: 15737721     Source Type: Journal    
DOI: 10.1007/s11042-013-1807-z     Document Type: Article
Times cited : (65)

References (42)
  • 2
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    • Arshad R, Ikram N (2011) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl. doi:10.1007/s11042-011-0787-0
    • (2011) Multimed Tools Appl
    • Arshad, R.1    Ikram, N.2
  • 3
    • 0003470642 scopus 로고
    • Security architecture for the Internet protocol
    • Atkinson R. Security architecture for the Internet protocol, RFC 1825
    • (1825) RFC
    • Atkinson, R.1
  • 7
    • 84929834218 scopus 로고    scopus 로고
    • EC Cryptography
    • Certicom Research Standard for efficient cryptography, SEC 1, 2000: EC Cryptography. Ver. 1.0
    • (2000) Ver , vol.1 , pp. 0
  • 8
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography, Published online in Wiley Online Library wileyonlinelibrary.com
    • Debiao H, Jianhua C, Yitao C (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography, Published online in Wiley Online Library wileyonlinelibrary.com. Security Comm Netw. doi:10.1002/sec.506
    • (2012) Security Comm Netw
    • Debiao, H.1    Jianhua, C.2    Yitao, C.3
  • 13
    • 84878306534 scopus 로고    scopus 로고
    • Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol
    • Hongbin T, Xinsong L (2012) Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol. Multimed Tools Appl. doi:10.1007/s11042-012-1001-8
    • (2012) Multimed Tools Appl
    • Hongbin, T.1    Xinsong, L.2
  • 14
    • 33847747356 scopus 로고    scopus 로고
    • A new efficient authentication scheme for session initiation protocol
    • Huang H, Wei W, Brown G (2006) A new efficient authentication scheme for session initiation protocol. Proceedings of JCIS 06
    • (2006) Proceedings of JCIS , pp. 06
    • Huang, H.1    Wei, W.2    Brown, G.3
  • 15
  • 17
    • 73549097525 scopus 로고    scopus 로고
    • Off-line password-guessing attack to Yang’s and Huang’s authentication schemes for session initiation ptorocol. Proceedings of INC
    • Jo H, Lee Y, Kim M, Kim S, Won D (2009) Off-line password-guessing attack to Yang’s and Huang’s authentication schemes for session initiation ptorocol. Proceedings of INC, IMS and IDC, pp 618–621
    • (2009) IMS and IDC , pp. 618-621
    • Jo, H.1    Lee, Y.2    Kim, M.3    Kim, S.4    Won, D.5
  • 18
    • 25544447732 scopus 로고    scopus 로고
    • Remote denial of service attacks and countermeasures. Department of Electrical Engineering, Princeton University
    • Karig D, Lee R (2001) Remote denial of service attacks and countermeasures. Department of Electrical Engineering, Princeton University, Technical Report CE-L2001-002
    • (2001) Technical Report CE-L2001-002
    • Karig, D.1    Lee, R.2
  • 19
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • Kent S, Atkinson R (1998) Security architecture for the Internet protocol, RFC 2401
    • (1998) RFC , pp. 2401
    • Kent, S.1    Atkinson, R.2
  • 20
    • 0026963441 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments. In: Proc. 24th Annual ACM Symposium on Theory of Computing, Victoria BC
    • Kilian J (1992) A note on efficient zero-knowledge proofs and arguments. In: Proc. 24th Annual ACM Symposium on Theory of Computing, Victoria BC, pp 723–732
    • (1992) pp 723–732
    • Kilian, J.1
  • 21
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:203–209
    • (1987) Math Comput , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 22
    • 76349090342 scopus 로고    scopus 로고
    • On security of an efficient nonce based authentication scheme for SIP
    • Lee CC (2009) On security of an efficient nonce based authentication scheme for SIP. Int J Netw Secur 3:201–203
    • (2009) Int J Netw Secur , vol.3 , pp. 201-203
    • Lee, C.C.1
  • 23
    • 79959688157 scopus 로고    scopus 로고
    • VoIP secure session assistance and call monitoring via building security gateway
    • Li J-S, Kao C-K, Tzeng J-J (2011) VoIP secure session assistance and call monitoring via building security gateway. Int J Commun Syst 24:837–851
    • (2011) Int J Commun Syst , vol.24 , pp. 837-851
    • Li, J.-S.1    Kao, C.-K.2    Tzeng, J.-J.3
  • 24
    • 34548135536 scopus 로고    scopus 로고
    • Off-line password guessing attack on an efficient key agreement protocol for secure authentication
    • Lu R, Cao Z (2006) Off-line password guessing attack on an efficient key agreement protocol for secure authentication. Int J Netw Secur 3(1):35–38
    • (2006) Int J Netw Secur , vol.3 , Issue.1 , pp. 35-38
    • Lu, R.1    Cao, Z.2
  • 26
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography. In: Advances in cryptology CRYPTO’85, Lecture Notes in Computer Science, vol. 218. Springer-Verlag
    • Miller V (1986) Uses of elliptic curves in cryptography. In: Advances in cryptology CRYPTO’85, Lecture Notes in Computer Science, vol. 218. Springer-Verlag, pp 417–426
    • (1986) pp 417–426
    • Miller, V.1
  • 28
    • 77950449367 scopus 로고    scopus 로고
    • Encryption and checksum specifications for Kerberos 5
    • Raeburn K (2005) Encryption and checksum specifications for Kerberos 5, RFC 3961
    • (2005) RFC , pp. 3961
    • Raeburn, K.1
  • 30
    • 0003240332 scopus 로고    scopus 로고
    • SIP: session initiation protocol
    • Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R, Handley M, Schooler E (2002) SIP: session initiation protocol, IETF RFC3261
    • (2002) IETF RFC3261
  • 32
    • 77952508844 scopus 로고    scopus 로고
    • SIP security requirements. IETF internet draft (draftthomas-sipsec-reg-00.txt)
    • Thomas M (2001) SIP security requirements. IETF internet draft (draftthomas-sipsec-reg-00.txt), work in progress
    • (2001) work
    • Thomas, M.1
  • 33
    • 70349751143 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initiation protocol
    • Tsai J (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8(3):312–316
    • (2009) Int J Netw Secur , vol.8 , Issue.3 , pp. 312-316
    • Tsai, J.1
  • 34
    • 0036870280 scopus 로고    scopus 로고
    • SIP security issues: the SIP authentication procedure and its processing load
    • Veltri L, Salsano S, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16(6):38–44
    • (2002) IEEE Netw , vol.16 , Issue.6 , pp. 38-44
    • Veltri, L.1    Salsano, S.2    Papalilo, D.3
  • 35
    • 33746248709 scopus 로고    scopus 로고
    • A forward-secure user authentication scheme with smart cards
    • Wang B, Li ZQ (2006) A forward-secure user authentication scheme with smart cards. Int J Netw Secur 3(2):116–119
    • (2006) Int J Netw Secur , vol.3 , Issue.2 , pp. 116-119
    • Wang, B.1    Li, Z.Q.2
  • 36
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31(2):286–291
    • (2009) Comput Stand Interfaces , vol.31 , Issue.2 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 37
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Xie Q (2011) A new authenticated key agreement for session initiation protocol. Int J Commun Syst. doi:10.1002/dac.1286
    • (2011) Int J Commun Syst
    • Xie, Q.1
  • 38
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • Yang C, Wang R, Liu WT (2005) Secure authentication scheme for session initiation protocol. Comput Secur 4:381–386
    • (2005) Comput Secur , vol.4 , pp. 381-386
    • Yang, C.1    Wang, R.2    Liu, W.T.3
  • 39
    • 84929838479 scopus 로고    scopus 로고
    • Ylonen T, Lonvick C (2006) (Eds) The secure shell (SSH) Transport layer protocol, RFC 4253
    • Ylonen T, Lonvick C (2006) (Eds) The secure shell (SSH) Transport layer protocol, RFC 4253
  • 40
    • 77952524229 scopus 로고    scopus 로고
    • Robust mutual authentication with a key agreement scheme for the session initiation protocol
    • Yoon EJ, Koo KY (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27(3):203–213
    • (2010) IETE Tech Rev , vol.27 , Issue.3 , pp. 203-213
    • Yoon, E.J.1    Koo, K.Y.2
  • 41
    • 84911977464 scopus 로고    scopus 로고
    • Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card
    • Zhang L, Tang S, Cai Z (2013) Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card. Int J Comm Syst
    • (2013) Int J Comm Syst
    • Zhang, L.1    Tang, S.2    Cai, Z.3
  • 42
    • 80051507362 scopus 로고    scopus 로고
    • Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks
    • Zhou L, Chao H-C, Vasilakos A (Aug. 2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29(7):1358–1367
    • (2011) IEEE J Sel Areas Commun , vol.29 , Issue.7 , pp. 1358-1367
    • Zhou, L.1    Chao, H.-C.2    Vasilakos, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.