PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone networks. However, the voice packets delivered over the Internet are not protected. The session initiation protocol (SIP) is widely used signaling protocol that controls communications on the Internet, typically using hypertext transport protocol (HTTP) digest authentication, which is vulnerable to many forms of attacks. This paper proposes a new secure authentication and key agreement scheme based on Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) named (ECDSA). Security analysis demonstrates that the proposed scheme can resist various attacks and it can be applied to authenticate the users with different SIP domains.
Rocznik
Tom
Strony
62--68
Opis fizyczny
Bibliogr. 14 poz., rys.
Twórcy
autor
  • Laboratory of Electronic, the Treatment of Signal and Physical Modeling (LETSMP), Faculty of Sciences, Ibn Zohr University, B.P 8106, Agadir 80000 Morocco
autor
  • Laboratory of the Systems Engineering and Information Technology, National School of Applied Science, Ibn Zohr University, 80000 Agadir Morocco
autor
  • Laboratory of the Systems Engineering and Information Technology, National School of Applied Science, Ibn Zohr University, 80000 Agadir Morocco
autor
  • Laboratory of Electronic, the Treatment of Signal and Physical Modeling (LETSMP), Faculty of Sciences, Ibn Zohr University, B.P 8106, Agadir 80000 Morocco
Bibliografia
  • [1] C.-H. Wang and Y.-S. Liu, “A dependable protection for end-toend VoIP via Elliptic-Curve Diffie-Hellman and dynamic changes”, J. of Netw. and Computer Appl., vol. 34, no. 5, pp. 1545–1556, 2011 (doi: 10.1016/j.jnca.2010.10.011).
  • [2] C.-C. Yang, R.-C. Wang, and W.-T. Liu, “Secure authentication scheme for session initiation protocol”, Comp. & Secur., vol. 24, no. 5, pp. 381–386, 2005 (doi: 10.1016/j.cose.2004.10.007).
  • [3] H.-L. Yeh, T.-H. Chen, and W.-K. Shih, “Robust smart card secured authentication sheme on SIP using Elliptic Curve Cryptography, Comp. Standards & Interfaces, vol. 9, no. 2, pp. 397–402, 2014 (doi:10.1016/j.csi.2013.08.010).
  • [4] L. Wu, Y. Zhang, and F. Wang, “A new provably secure authentication and key agreement protocol for SIP using ECC”, Com. Standards & Interfaces, vol. 31, no. 2, pp. 286–291, 2009 (doi: 10.1016/j.csi.2008.01.002).
  • [5] E.-J. Yoon et al., “A secure and efficient SIP authentication scheme for converged VoIP networks”, Comp. Commun., vol. 33, no. 14, pp. 1674–1681, 2010 (doi: 10.1016/j.comcom.2010.03.026).
  • [6] F. Wang and Y. Zhang, “A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography”, Comp. Commun., vol. 31, no. 10, pp. 2142–2149, 2008 (doi: 10.1016/j.comcom.2008.01.054).
  • [7] Y.-P. Liao and S.-S. Wang, “A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves”, Comp. Commun., vol. 33, no. 3, pp. 372–380, 2010 (doi: 10.1016/j.comcom.2009.10.005).
  • [8] R. Arshad and N. Ikram, “Elliptic curve cryptography based mutual authentication scheme for session initiation protocol”, Multimed. Tools & Appl., vol. 66, no. 2, pp. 165–178, 2013 (doi: 10.1007/s11042-011-0787-0).
  • [9] L. Zhang, S. Tang, and S. Zhu, “An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks”, J. of Netw. & Comp. Appl., vol. 59, pp. 126–133, 2016 (doi: 10.1016/j.jnca.2015.06.022).
  • [10] J. Rosenberg et al., “SIP: Session Initiation Protocol”, IETF RFC 3261, 2002 [Online]. Available: https://www.ietf.org/rfc/rfc3261.txt
  • [11] J. Franks et al., “HTTP Authentication: Basic and Digest Access Authentication”, IETF RFC 2617, 1999 [Online]. Available: https://www.ietf.org/rfc/rfc2617.txt
  • [12] N. Koblitz, “Elliptic curve cryptosystems”, Mathem. of Comput., vol. 48, no. 177, pp. 203–209, 1987 (doi: 10.1090/S0025-57181987-0866109-5).
  • [13] S. V. D. Johnson, A. Menezes, “The elliptic curve digital signature algorithm (ECDSA)”, Int. J. of Inform. Secur., vol. 1, no. 1, pp. 36–63, 2001 (doi: 10.1007/s102070100002).
  • [14] S. Sadat, M. Nik, and M. Shahrabi, “Mutual SIP authentication scheme based on ECC”, Int. J. of Comp. & Elec. Engin., vol. 6, no. 2, pp. 196–200, 2014 (doi: 10.7763/IJCEE.2014.V6.821).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-32973207-ada7-406c-b463-80f696baa77a
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.