메뉴 건너뛰기




Volumn 9, Issue 2, 2016, Pages 449-459

A secure and efficient mutual authentication scheme for session initiation protocol

Author keywords

Authentication; Elliptic curve cryptosystem; Key agreement; Session initiation protocol

Indexed keywords

ALUMINUM; AUTHENTICATION; INTERNET PROTOCOLS; MOBILE SECURITY; MULTIMEDIA SERVICES;

EID: 84957427047     PISSN: 19366442     EISSN: 19366450     Source Type: Journal    
DOI: 10.1007/s12083-015-0363-x     Document Type: Article
Times cited : (46)

References (39)
  • 1
    • 0036870280 scopus 로고    scopus 로고
    • SIP security issues: the SIP authentication procedure and its processing load
    • Veltri L, Salsano S, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16(6):38–44
    • (2002) IEEE Netw , vol.16 , Issue.6 , pp. 38-44
    • Veltri, L.1    Salsano, S.2    Papalilo, D.3
  • 2
    • 84957444419 scopus 로고    scopus 로고
    • Camarillo G, Niemi A, Haukka T: Security mechanism agreement for SIP sessions. IETF Internet Draft, Ju
    • Arkko J, Torvinen V, Camarillo G, Niemi A, Haukka T (2002) Security mechanism agreement for SIP sessions. IETF Internet Draft, Jun
    • (2002) Torvinen , vol.V
    • Arkko, J.1
  • 3
    • 84957444420 scopus 로고    scopus 로고
    • Thomas M (2001) SIP Security Requirements. IETF Internet Draft, Work In Progress No
    • Thomas M (2001) SIP Security Requirements. IETF Internet Draft, Work In Progress Nov
  • 4
    • 84928473734 scopus 로고    scopus 로고
    • Robust and efficient authentication scheme for session initiation protocol
    • Article ID 894549
    • Lu Y, Li L, Yang Y (2015) Robust and efficient authentication scheme for session initiation protocol. Math Probl Eng 2015:2015. doi:10.1155/2015/894549. Article ID 894549, 9
    • (2015) Math Probl Eng , vol.2015 , pp. 2015
    • Lu, Y.1    Li, L.2    Yang, Y.3
  • 6
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • Yang C, Wang R, Liu W (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381–386
    • (2005) Comput Secur , vol.24 , pp. 381-386
    • Yang, C.1    Wang, R.2    Liu, W.3
  • 7
    • 84976665942 scopus 로고
    • Timestamps in key distribution systems
    • Denning D, Sacco G (1981) Timestamps in key distribution systems. Commun ACM 24:533–536
    • (1981) Commun ACM , vol.24 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 8
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429
    • (2012) Secur Commun Netw , vol.5 , Issue.12 , pp. 1423-1429
    • He, D.1    Chen, J.2    Chen, Y.3
  • 9
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:417–426
    • (1987) Math Comput , vol.48 , pp. 417-426
    • Koblitz, N.1
  • 10
    • 74149091306 scopus 로고    scopus 로고
    • A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
    • Liao Y, Wang S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33:372–380
    • (2010) Comput Commun , vol.33 , pp. 372-380
    • Liao, Y.1    Wang, S.2
  • 14
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31:286–291
    • (2009) Comput Stand Interfaces , vol.31 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 15
    • 77955431593 scopus 로고    scopus 로고
    • A secure and efficient SIP authentication scheme for converged VoIP networks
    • Yoon EJ, Yoo KY, Kim C, Hong YS, Jo M, Chen HH (2010) A secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33:1674–1681
    • (2010) Comput Commun , vol.33 , pp. 1674-1681
    • Yoon, E.J.1    Yoo, K.Y.2    Kim, C.3    Hong, Y.S.4    Jo, M.5    Chen, H.H.6
  • 16
    • 84957444421 scopus 로고    scopus 로고
    • Cryptanalysis of SIP secure and efficient authentication scheme, Proceedings ICCS
    • Gokhroo MK, Jaidhar CD, Tomar AS (2011) Cryptanalysis of SIP secure and efficient authentication scheme. Proceedings ICCSN
    • (2011) Tomar AS
    • Gokhroo, M.K.1    Jaidhar, C.D.2
  • 17
    • 84901344152 scopus 로고    scopus 로고
    • Weaknesses of SIP authentication scheme for converged VoIP networks
    • Pu Q (2010) Weaknesses of SIP authentication scheme for converged VoIP networks. IACR Cryptol ePrint Arch
    • (2010) IACR Cryptol ePrint Arch
    • Pu, Q.1
  • 18
    • 70349751143 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initiation protocol
    • Tsai J (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8 (3):312–316
    • (2009) Int J Netw Secur , vol.8 , Issue.3 , pp. 312-316
    • Tsai, J.1
  • 19
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    • Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178
    • (2013) Multimed Tools Appl , vol.66 , Issue.2 , pp. 165-178
    • Arshad, R.1    Ikram, N.2
  • 20
    • 78651081750 scopus 로고    scopus 로고
    • A secured authentication protocol for SIP using elliptic curves cryptography
    • Chen T H, Yeh H L, Liu P C, Hsiang H C, Shih W K (2010) A secured authentication protocol for SIP using elliptic curves cryptography. CN CCIS 119:46–55
    • (2010) CN CCIS , vol.119 , pp. 46-55
    • Chen, T.H.1    Yeh, H.L.2    Liu, P.C.3    Hsiang, H.C.4    Shih, W.K.5
  • 21
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • Lin C, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68–72
    • (2003) Comput Secur , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.1    Hwang, T.2
  • 23
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Xie Q (2012) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25(1):47–54
    • (2012) Int J Commun Syst , vol.25 , Issue.1 , pp. 47-54
    • Xie, Q.1
  • 24
    • 84890424682 scopus 로고    scopus 로고
    • An enhanced authenticated key agreement for session initiation protocol
    • Farash M S, Attari M A (2013) An enhanced authenticated key agreement for session initiation protocol. Inf Technol Control 42(4):333–342
    • (2013) Inf Technol Control , vol.42 , Issue.4 , pp. 333-342
    • Farash, M.S.1    Attari, M.A.2
  • 25
    • 85018102575 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    • Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography, Multimedia Tools Applied
    • (2014) Multimedia Tools Applied
    • Zhang, Z.1    Qi, Q.2    Kumar, N.3    Chilamkurti, N.4    Jeong, H.Y.5
  • 26
    • 0043135196 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
    • Vanstone S A (1997) Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf Secur Tech Rep 12:78–87
    • (1997) Inf Secur Tech Rep , vol.12 , pp. 78-87
    • Vanstone, S.A.1
  • 27
    • 30744432873 scopus 로고    scopus 로고
    • Some Observations on the theory of cryptographic hash functions
    • Stinson DR (2006) Some Observations on the theory of cryptographic hash functions. Desi Codes Crypto 38(2):259–277
    • (2006) Desi Codes Crypto , vol.38 , Issue.2 , pp. 259-277
    • Stinson, D.R.1
  • 29
    • 1442292337 scopus 로고    scopus 로고
    • Protocols for authentication and key establishment
    • Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer
    • (2003) Springer
    • Boyd, C.1    Mathuria, A.2
  • 30
    • 51849131973 scopus 로고    scopus 로고
    • On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Advances in Cryptology-CRYPTO 2008. Springer
    • Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM (2008) On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Advances in Cryptology-CRYPTO 2008. Springer, pp 203–220
    • (2008) pp 203–220
    • Eisenbarth, T.1    Kasper, T.2    Moradi, A.3    Paar, C.4    Salmasizadeh, M.5    Shalmani, M.T.M.6
  • 31
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772
    • (1981) Commun ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 32
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • Yang W, Shieh SP (1999) Password authentication schemes with smart cards. Comput Secur 18(8):727–733
    • (1999) Comput Secur , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.1    Shieh, S.P.2
  • 33
    • 84894255457 scopus 로고    scopus 로고
    • An enhanced access control scheme in wireless sensor networks
    • Chatterjee S, Das AK, Sing JK (2014) An enhanced access control scheme in wireless sensor networks. Ad Hoc Sensor Wireless Netw 21(1-2):121–149
    • (2014) Ad Hoc Sensor Wireless Netw , vol.21 , Issue.1-2 , pp. 121-149
    • Chatterjee, S.1    Das, A.K.2    Sing, J.K.3
  • 34
    • 84897055589 scopus 로고    scopus 로고
    • A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
    • Odelu V, Das AK, Goswami A (2014) A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sci 269(10):270–285
    • (2014) Inform Sci , vol.269 , Issue.10 , pp. 270-285
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 35
    • 84943362549 scopus 로고    scopus 로고
    • An improved authentication protocol for session initiation protocol using smart card
    • Tu H, Kumar N, Chilamkurti N, Rho S (2014) An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Network Applied
    • (2014) Peer-to-Peer Network Applied
    • Tu, H.1    Kumar, N.2    Chilamkurti, N.3    Rho, S.4
  • 36
    • 84890128171 scopus 로고    scopus 로고
    • Robust smart card secured authentication scheme on SIP using elliptic curve cryptography
    • Yeh HL, Chen TH, Shih WK (2014) Robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Comput Stand Interfaces 36:397–402
    • (2014) Comput Stand Interfaces , vol.36 , pp. 397-402
    • Yeh, H.L.1    Chen, T.H.2    Shih, W.K.3
  • 37
    • 77952524229 scopus 로고    scopus 로고
    • Robust mutual authentication with a key agreement scheme for the session initiation protocol
    • Yoon EJ, Shin YN, Jeon IS, Yoo KY (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27(3):203–213
    • (2010) IETE Tech Rev , vol.27 , Issue.3 , pp. 203-213
    • Yoon, E.J.1    Shin, Y.N.2    Jeon, I.S.3    Yoo, K.Y.4
  • 38
    • 84911977464 scopus 로고    scopus 로고
    • Efficient and flexible password authenticated key agreement for Voice over Internet protocol session initiation protocol using smart card
    • Zhang L, Tang S, Cai Z (2013), Efficient and flexible password authenticated key agreement for Voice over Internet protocol session initiation protocol using smart card. International Journal Communication System
    • (2013) International Journal Communication System
    • Zhang, L.1    Tang, S.2    Cai, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.