1. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy
- Author
-
Haseeb Ahmad, Shuming Qiu, Guoai Xu, and Yanhui Guo
- Subjects
computer.internet_protocol ,Computer science ,Health Smart Cards ,lcsh:Medicine ,Synthesis Phase ,Cryptography ,02 engineering and technology ,Internet security ,Polynomials ,Database and Informatics Methods ,Signal Initiation ,Forward secrecy ,0202 electrical engineering, electronic engineering, information engineering ,Password authentication protocol ,Cell Cycle and Cell Division ,Computer Networks ,Database Searching ,lcsh:Science ,Password ,Social Responsibility ,Multidisciplinary ,Communication ,Mechanisms of Signal Transduction ,Multimedia ,Cell Processes ,Physical Sciences ,The Internet ,Smart card ,Communications protocol ,Confidentiality ,Computer network ,Research Article ,Signal Transduction ,Information Systems ,Computer and Information Sciences ,Research and Analysis Methods ,Computer Security ,Session Initiation Protocol ,Authentication ,Internet ,business.industry ,lcsh:R ,Biology and Life Sciences ,020206 networking & telecommunications ,020207 software engineering ,Cell Biology ,Algebra ,lcsh:Q ,business ,computer ,Algebraic Geometry ,Mathematics ,Software - Abstract
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
- Published
- 2018