메뉴 건너뛰기




Volumn 75, Issue 1, 2016, Pages 181-197

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

Author keywords

Authentication; Elliptic curve cryptosystem (ECC); Key agreement; Security; Session initiation protocol (SIP); VoIP

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; GEOMETRY; INTERNET TELEPHONY; NETWORK SECURITY; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 84953636249     PISSN: 13807501     EISSN: 15737721     Source Type: Journal    
DOI: 10.1007/s11042-014-2282-x     Document Type: Article
Times cited : (93)

References (45)
  • 1
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    • Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178
    • (2013) Multimed Tools Appl , vol.66 , Issue.2 , pp. 165-178
    • Arshad, R.1    Ikram, N.2
  • 3
    • 84890424682 scopus 로고    scopus 로고
    • An enhanced authenticated key agreement for session initiation protocol
    • Farash MS, Attari MA (2013) An enhanced authenticated key agreement for session initiation protocol. Inform Technol Control 42(4):333–342
    • (2013) Inform Technol Control , vol.42 , Issue.4 , pp. 333-342
    • Farash, M.S.1    Attari, M.A.2
  • 4
    • 84872116385 scopus 로고    scopus 로고
    • Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication
    • Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensic Secur 8(1):136–148
    • (2013) IEEE Trans Inf Forensic Secur , vol.8 , Issue.1 , pp. 136-148
    • Frank, M.1    Biedert, R.2    Ma, E.3    Martinovic, I.4    Song, D.5
  • 8
    • 84881192601 scopus 로고    scopus 로고
    • Group authentication
    • Harn L (2013) Group authentication. IEEE Trans Comput 62(9):1893–1898
    • (2013) IEEE Trans Comput , vol.62 , Issue.9 , pp. 1893-1898
    • Harn, L.1
  • 9
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429
    • (2012) Secur Commun Netw , vol.5 , Issue.12 , pp. 1423-1429
    • He, D.1    Chen, J.2    Chen, Y.3
  • 10
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
    • He D, Chen J, Hu J (2012) An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf Fusion 13(3):223–230
    • (2012) Inf Fusion , vol.13 , Issue.3 , pp. 223-230
    • He, D.1    Chen, J.2    Hu, J.3
  • 11
    • 84929842561 scopus 로고    scopus 로고
    • A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
    • Irshad A, Sher M, Rehman E, Ashraf Ch S, Hassan MU, Ghani A (2013) A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card. Multimed Tools Appl. doi:10.1007/s11042-013-1807-z
    • (2013) Multimed Tools Appl
    • Irshad, A.1    Sher, M.2    Rehman, E.3    Ashraf Ch, S.4    Hassan, M.U.5    Ghani, A.6
  • 12
    • 84904860928 scopus 로고    scopus 로고
    • A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
    • Irshad A, Sher M, Faisal MS, Ghani A, Hassan MU, Ashraf Ch S (2014) A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur Commun Netw 7:1210–1218
    • (2014) Secur Commun Netw , vol.7 , pp. 1210-1218
    • Irshad, A.1    Sher, M.2    Faisal, M.S.3    Ghani, A.4    Hassan, M.U.5    Ashraf Ch, S.6
  • 13
    • 84925354738 scopus 로고    scopus 로고
    • Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al
    • Jiang Q, Ma J, Tian Y (2014) Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int J Commun Syst. doi:10.1002/dac.2767
    • (2014) Int J Commun Syst
    • Jiang, Q.1    Ma, J.2    Tian, Y.3
  • 14
    • 84901189762 scopus 로고    scopus 로고
    • A survey of SIP authentication and key agreement schemes
    • Kilinc HH, Yanik T (2014) A survey of SIP authentication and key agreement schemes. IEEE Commun Surv Tutor 16(2):1005–1023
    • (2014) IEEE Commun Surv Tutor , vol.16 , Issue.2 , pp. 1005-1023
    • Kilinc, H.H.1    Yanik, T.2
  • 15
  • 16
    • 0000474763 scopus 로고    scopus 로고
    • Differential power analysis. Advances in Cryptology
    • Kocher P, Jaffe J, Jun B (1999) Differential power analysis. Advances in Cryptology, CRYPTO’991999; 1666:788–797
    • (1999) CRYPTO’991999 , vol.1666 , pp. 788-797
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 17
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of Peyravian-Zunic’s password authentication scheme
    • Ku WC, Chen CM, Lee HL (2003) Cryptanalysis of a variant of Peyravian-Zunic’s password authentication scheme. IEICE Trans Commun E86-B(5):1682–1684
    • (2003) IEICE Trans Commun , vol.E86-B , Issue.5 , pp. 1682-1684
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 18
    • 84876307417 scopus 로고    scopus 로고
    • A new certificateless authenticated key agreement protocol for SIP with different KGCs
    • Li X, Zhang Y, Zhang G (2013) A new certificateless authenticated key agreement protocol for SIP with different KGCs. Secur Commun Netw 6:631–643
    • (2013) Secur Commun Netw , vol.6 , pp. 631-643
    • Li, X.1    Zhang, Y.2    Zhang, G.3
  • 20
    • 80455155201 scopus 로고    scopus 로고
    • Zero-knowledge authentication protocol based on alternative mode in RFID systems
    • Liu H, Ning H (2011) Zero-knowledge authentication protocol based on alternative mode in RFID systems. IEEE Sensors J 11(12):3235–3245
    • (2011) IEEE Sensors J , vol.11 , Issue.12 , pp. 3235-3245
    • Liu, H.1    Ning, H.2
  • 21
    • 84953641819 scopus 로고    scopus 로고
    • Lynn B. Pairing-based cryptography library
    • Lynn B. Pairing-based cryptography library, available at http://crypto.stanford.edu/pbc/
  • 22
    • 84911988880 scopus 로고    scopus 로고
    • Security flaws in two improved remote user authentication schemes using smart cards
    • Ma CG, Wang D, Zhao SD (2012) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst. doi:10.1002/dac.2468
    • (2012) Int J Commun Syst
    • Ma, C.G.1    Wang, D.2    Zhao, S.D.3
  • 23
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
    • (2002) IEEE Trans Comput , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 24
    • 84867860941 scopus 로고    scopus 로고
    • Secure communication of medical information using mobile agents
    • Nikooghadam M, Zakerolhosseini A (2012) Secure communication of medical information using mobile agents. J Med Syst 36(6):3839–3850
    • (2012) J Med Syst , vol.36 , Issue.6 , pp. 3839-3850
    • Nikooghadam, M.1    Zakerolhosseini, A.2
  • 25
    • 77956061440 scopus 로고    scopus 로고
    • Efficient utilization of elliptic curve cryptosystem for hierarchical access control
    • Nikooghadam M, Zakerolhosseini A, Moghaddam ME (2010) Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J Syst Softw 83(10):1917–1929
    • (2010) J Syst Softw , vol.83 , Issue.10 , pp. 1917-1929
    • Nikooghadam, M.1    Zakerolhosseini, A.2    Moghaddam, M.E.3
  • 26
    • 84874300958 scopus 로고    scopus 로고
    • Secure SIP authentication scheme supporting lawful interception
    • Pu Q, Wang J, Wu S (2013) Secure SIP authentication scheme supporting lawful interception. Secur Commun Netw 6:340–350
    • (2013) Secur Commun Netw , vol.6 , pp. 340-350
    • Pu, Q.1    Wang, J.2    Wu, S.3
  • 28
    • 0036870280 scopus 로고    scopus 로고
    • SIP security issues: the SIP authentication procedure and its processing load
    • Salsano S, Veltri L, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16:38–44
    • (2002) IEEE Netw , vol.16 , pp. 38-44
    • Salsano, S.1    Veltri, L.2    Papalilo, D.3
  • 29
    • 33750013256 scopus 로고    scopus 로고
    • Denial of service attacks targeting a Sip VoIP infrastructure: stack scenarios and prevention mechanisms
    • Sisalem D, Kuthan J, Ehlert S (2006) Denial of service attacks targeting a Sip VoIP infrastructure: stack scenarios and prevention mechanisms. IEEE Netw 20(5):26–31
    • (2006) IEEE Netw , vol.20 , Issue.5 , pp. 26-31
    • Sisalem, D.1    Kuthan, J.2    Ehlert, S.3
  • 32
    • 84878306534 scopus 로고    scopus 로고
    • Cryptanalysis of Arshad et al’.s ECC-based mutual authentication scheme for session initiation protocol
    • Tang H, Liu X (2013) Cryptanalysis of Arshad et al’.s ECC-based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 65(3):321–333
    • (2013) Multimed Tools Appl , vol.65 , Issue.3 , pp. 321-333
    • Tang, H.1    Liu, X.2
  • 33
    • 70349751143 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initiation protocol
    • Tsai JL (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8(3):312–316
    • (2009) Int J Netw Secur , vol.8 , Issue.3 , pp. 312-316
    • Tsai, J.L.1
  • 34
    • 84938740758 scopus 로고    scopus 로고
    • An improved authentication protocol for session initiation protocol using smart card
    • Tu H, Kumar N, Chilamkurti N, Rho S (2014) An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Netw Appl. doi:10.1007/s12083-014-0248-4
    • (2014) Peer-to-Peer Netw Appl
    • Tu, H.1    Kumar, N.2    Chilamkurti, N.3    Rho, S.4
  • 35
    • 0043135196 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
    • Vanstone SA (1997) Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf Secur Tech Rep 12:78–87
    • (1997) Inf Secur Tech Rep , vol.12 , pp. 78-87
    • Vanstone, S.A.1
  • 36
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31(2):286–291
    • (2009) Comput Stand Interfaces , vol.31 , Issue.2 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 37
    • 84872342509 scopus 로고    scopus 로고
    • Practical authentication scheme for SIP
    • Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61–74
    • (2013) Peer-to-Peer Netw Appl , vol.6 , Issue.1 , pp. 61-74
    • Wu, S.1    Pu, Q.2    Kang, F.3
  • 38
    • 84901331673 scopus 로고    scopus 로고
    • An improved authentication protocol for session initiation protocol using smart card and elliptic curve cryptography
    • Wu K, Gong P, Wang J, Yan X, Li P (2013) An improved authentication protocol for session initiation protocol using smart card and elliptic curve cryptography. Rom J Inf Sci Technol 16(4):324–335
    • (2013) Rom J Inf Sci Technol , vol.16 , Issue.4 , pp. 324-335
    • Wu, K.1    Gong, P.2    Wang, J.3    Yan, X.4    Li, P.5
  • 39
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Xie Q (2012) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25(1):47–54
    • (2012) Int J Commun Syst , vol.25 , Issue.1 , pp. 47-54
    • Xie, Q.1
  • 40
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • Yang CC, Wang RC, Liu WT (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381–386
    • (2005) Comput Secur , vol.24 , pp. 381-386
    • Yang, C.C.1    Wang, R.C.2    Liu, W.T.3
  • 42
    • 77955431593 scopus 로고    scopus 로고
    • A secure and efficient SIP authentication scheme for converged VoIP networks
    • Yoon EJ, Yoo KY, Kim C, Hong Y, Jo M, Chen H (2010) A secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33(14):1674–1681
    • (2010) Comput Commun , vol.33 , Issue.14 , pp. 1674-1681
    • Yoon, E.J.1    Yoo, K.Y.2    Kim, C.3    Hong, Y.4    Jo, M.5    Chen, H.6
  • 43
    • 84911957404 scopus 로고    scopus 로고
    • Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
    • Zhang L, Tang S, Cai Z (2013) Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. Int J Commun Syst. doi:10.1002/dac.2499
    • (2013) Int J Commun Syst
    • Zhang, L.1    Tang, S.2    Cai, Z.3
  • 44
    • 84911945065 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards
    • Zhang L, Tang S, Cai Z (2014) Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards. Secur Commun Netw. doi:10.1002/sec.951
    • (2014) Secur Commun Netw
    • Zhang, L.1    Tang, S.2    Cai, Z.3
  • 45
    • 80051507362 scopus 로고    scopus 로고
    • Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks
    • Zhou L, Chao H-C, Vasilakos AV (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29(7):1358–1367
    • (2011) IEEE J Sel Areas Commun , vol.29 , Issue.7 , pp. 1358-1367
    • Zhou, L.1    Chao, H.-C.2    Vasilakos, A.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.