Skip to main content
Top
Published in: Wireless Personal Communications 3/2016

02-08-2016

A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography

Published in: Wireless Personal Communications | Issue 3/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The session initiation protocol (SIP) is a signaling communications protocol, which is widely used for controlling multimedia communication sessions. Recently, Yeh et al. presented an ECC-based authenticated protocol for SIP to conquer various attacks which were found in earlier schemes. In this paper, we analyze the security of Yeh et al.’s scheme and identify that Yeh et al.’s scheme is insecure. We demonstrate the vulnerability of Yeh et al.’s scheme to resist off-line password guessing attack, and their scheme also lacks the forward secrecy. We aim to propose an efficient improvement on Yeh et al.’s scheme to overcome the security weaknesses found in Yeh et al.’s scheme, while retaining the original merits. Through the rigorous informal security analysis and the formal security analysis using the widely-accepted Burrows–Abadi–Needham logic (BAN logic), we show that our scheme is secure against various known attacks including the attacks found in Yeh et al.’s scheme. Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (automated validation of internet security protocols and applications) tool, and show that our scheme is secure against passive and active attacks including the replay and man-in-the-middle attacks. Additionally, our proposed scheme is efficient in terms of the communication and computational overheads as compared to Yeh et al.’s scheme and other related existing schemes. To demonstrate the practicality of the scheme, we evaluate the proposed scheme using the broadly-accepted NS-2 network simulator.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Arkko, J., Torvinen, V., Camarillo, G., Niemi, A., Haukka, T. (2002). Security mechanism agreement for sip sessions. draft-ietfsip-sec-agree-04. txt. Arkko, J., Torvinen, V., Camarillo, G., Niemi, A., Haukka, T. (2002). Security mechanism agreement for sip sessions. draft-ietfsip-sec-agree-04. txt.
2.
go back to reference Arshad, R., & Ikram, N. (2013). Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimedia Tools and Applications, 66(2), 165–178.CrossRef Arshad, R., & Ikram, N. (2013). Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimedia Tools and Applications, 66(2), 165–178.CrossRef
3.
go back to reference Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication proceedings of the royal society of London. A Mathematical and Physical Sciences, 426(1871), 233–271.MathSciNetCrossRefMATH Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication proceedings of the royal society of London. A Mathematical and Physical Sciences, 426(1871), 233–271.MathSciNetCrossRefMATH
4.
go back to reference Caballero-Gil, C., Caballero-Gil, P., & Molina-Gil, J. (2014). Mutual authentication in self-organized vanets. Computer Standards & Interfaces, 36(4), 704–710.CrossRef Caballero-Gil, C., Caballero-Gil, P., & Molina-Gil, J. (2014). Mutual authentication in self-organized vanets. Computer Standards & Interfaces, 36(4), 704–710.CrossRef
5.
go back to reference Durlanik, A., & Sogukpinar, I. (2005). Sip authentication scheme using ecdh. World Enformatika Socity Transations on Engineering Computing and Technology, 8, 350–353. Durlanik, A., & Sogukpinar, I. (2005). Sip authentication scheme using ecdh. World Enformatika Socity Transations on Engineering Computing and Technology, 8, 350–353.
6.
go back to reference Farash, M. S. (2016). Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications, 9(1), 82–91.CrossRef Farash, M. S. (2016). Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications, 9(1), 82–91.CrossRef
7.
go back to reference Gokhroo, M., Jaidhar, C., Tomar, A. (2011). Cryptanalysis of sip secure and efficient authentication scheme. In 2011 IEEE 3rd international conference on communication software and networks (ICCSN), IEEE pp. 308–310. Gokhroo, M., Jaidhar, C., Tomar, A. (2011). Cryptanalysis of sip secure and efficient authentication scheme. In 2011 IEEE 3rd international conference on communication software and networks (ICCSN), IEEE pp. 308–310.
8.
go back to reference Khan, M. K., Zhang, J., & Wang, X. (2008). Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaotic, Solitons and Fractals, 35(3), 519–524.CrossRef Khan, M. K., Zhang, J., & Wang, X. (2008). Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaotic, Solitons and Fractals, 35(3), 519–524.CrossRef
9.
go back to reference Li, C. T., & Hwang, M. S. (2010). An efficient biometric-based remote authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5.CrossRef Li, C. T., & Hwang, M. S. (2010). An efficient biometric-based remote authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5.CrossRef
10.
go back to reference Li, X., Niu, J. W., Ma, J., Wang, W. D., & Liu, C. L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.CrossRef Li, X., Niu, J. W., Ma, J., Wang, W. D., & Liu, C. L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.CrossRef
11.
go back to reference Basin, D., Modersheim, S., & Vigano, L. (2005). OFMC: A symbolic model checker for security protocols. International Journal of Information Security, 4(3), 181–208.CrossRef Basin, D., Modersheim, S., & Vigano, L. (2005). OFMC: A symbolic model checker for security protocols. International Journal of Information Security, 4(3), 181–208.CrossRef
12.
go back to reference Odelu, V., Das, A. K., & Goswami, A. (2015). A secure and efficient ecc-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks, 8(9), 1732–1751.CrossRef Odelu, V., Das, A. K., & Goswami, A. (2015). A secure and efficient ecc-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks, 8(9), 1732–1751.CrossRef
13.
go back to reference Lv, C., Ma, M., Li, H., Ma, J., & Zhang, Y. (2013). An novel three-party authenticated key exchange protocol using one-time key. Journal of Network and Computer Applications, 36(1), 498–503.CrossRef Lv, C., Ma, M., Li, H., Ma, J., & Zhang, Y. (2013). An novel three-party authenticated key exchange protocol using one-time key. Journal of Network and Computer Applications, 36(1), 498–503.CrossRef
16.
go back to reference von Oheimb, D. (2005). The high-level protocol specification language hlpsl developed in the eu project avispa. In Proceedings of APPSEM, 2005, 1–17. von Oheimb, D. (2005). The high-level protocol specification language hlpsl developed in the eu project avispa. In Proceedings of APPSEM, 2005, 1–17.
17.
go back to reference He, D., Chen, J., & Chen, Y. (2012). A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks, 5(12), 1423–1429.CrossRef He, D., Chen, J., & Chen, Y. (2012). A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks, 5(12), 1423–1429.CrossRef
18.
go back to reference Geneiatakis, D., Dagiuklas, T., Kambourakis, G., Lambrinoudakis, C., Gritzalis, S., Ehlert, S., et al. (2006). Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys and Tutorials, 8(1–4), 68–81.CrossRef Geneiatakis, D., Dagiuklas, T., Kambourakis, G., Lambrinoudakis, C., Gritzalis, S., Ehlert, S., et al. (2006). Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys and Tutorials, 8(1–4), 68–81.CrossRef
19.
go back to reference Keromytis, A. D. (2012). A comprehensive survey of voice over IP security research. IEEE Communications Surveys & Tutorials, 14(2), 514–537.CrossRef Keromytis, A. D. (2012). A comprehensive survey of voice over IP security research. IEEE Communications Surveys & Tutorials, 14(2), 514–537.CrossRef
20.
go back to reference Geneiatakis, D., Kambourakis, G., Dagiuklas, T., Lambrinoudakis, C., Gritzalis, S. (2005) SIP Security Mechanisms: A state-of-the-art review. Proceedings of the fifth international network conference (INC 2005), (pp. 147–155). Geneiatakis, D., Kambourakis, G., Dagiuklas, T., Lambrinoudakis, C., Gritzalis, S. (2005) SIP Security Mechanisms: A state-of-the-art review. Proceedings of the fifth international network conference (INC 2005), (pp. 147–155).
21.
go back to reference Geneiatakis, D., Kambourakis, G., Lambrinoudakis, C., Dagiuklas, T., & Gritzalis, S. (2007). A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks, 51(10), 2580–2593.CrossRefMATH Geneiatakis, D., Kambourakis, G., Lambrinoudakis, C., Dagiuklas, T., & Gritzalis, S. (2007). A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks, 51(10), 2580–2593.CrossRefMATH
22.
go back to reference Tsakountakis, A., Kambourakis, G., & Gritzalis, S. (2012). SIPA: Generic and secure accounting for SIP. Security and Communication Networks, 5(9), 1006–1027.CrossRef Tsakountakis, A., Kambourakis, G., & Gritzalis, S. (2012). SIPA: Generic and secure accounting for SIP. Security and Communication Networks, 5(9), 1006–1027.CrossRef
23.
go back to reference Huang, H. F., & Wei, W. C. (2006). A new efficient authentication scheme for session initiation protocol. Computing, 1, 2. Huang, H. F., & Wei, W. C. (2006). A new efficient authentication scheme for session initiation protocol. Computing, 1, 2.
24.
go back to reference Kambourakis, G. (2014). Anonymity and closely related terms in the cyberspace: An analysis by example. Journal of Information Security and Applications, 19(1), 2–17.CrossRef Kambourakis, G. (2014). Anonymity and closely related terms in the cyberspace: An analysis by example. Journal of Information Security and Applications, 19(1), 2–17.CrossRef
25.
go back to reference Jo, H., Lee, Y., Kim, M., Kim, S., & Won, D. (2009). Off-line password-guessing attack to Yang’s and Huang’s authentication schemes for session initiation protocol. In Fifth IEEE International Joint Conference on INC, IMS and IDC, Seoul, South Korea (pp. 618–621). Jo, H., Lee, Y., Kim, M., Kim, S., & Won, D. (2009). Off-line password-guessing attack to Yang’s and Huang’s authentication schemes for session initiation protocol. In Fifth IEEE International Joint Conference on INC, IMS and IDC, Seoul, South Korea (pp. 618–621).
26.
go back to reference Lee, N. Y., & Chiu, Y. C. (2005). Improved remote authentication scheme with smart card. Computer Standards & Interfaces, 27(2), 177–180.CrossRef Lee, N. Y., & Chiu, Y. C. (2005). Improved remote authentication scheme with smart card. Computer Standards & Interfaces, 27(2), 177–180.CrossRef
27.
go back to reference Pu, Q. (2010). Weaknesses of sip authentication scheme for converged voip networks. IACR Cryptology ePrint Archive, 2010, 464. Pu, Q. (2010). Weaknesses of sip authentication scheme for converged voip networks. IACR Cryptology ePrint Archive, 2010, 464.
28.
go back to reference Rhee, H. S., Kwon, J. O., & Lee, D. H. (2009). A remote user authentication scheme without using smart cards. Computer Standards & Interfaces, 31(1), 6–13.CrossRef Rhee, H. S., Kwon, J. O., & Lee, D. H. (2009). A remote user authentication scheme without using smart cards. Computer Standards & Interfaces, 31(1), 6–13.CrossRef
29.
go back to reference Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., & Sparks, R., et al. (2002). Sip: Session initiation protocol. Technical report, RFC 3261, Internet Engineering Task Force. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., & Sparks, R., et al. (2002). Sip: Session initiation protocol. Technical report, RFC 3261, Internet Engineering Task Force.
30.
go back to reference Salsano, S., Veltri, L., & Papalilo, D. (2002). Sip security issues: The sip authentication procedure and its processing load. Network, IEEE, 16(6), 38–44.CrossRef Salsano, S., Veltri, L., & Papalilo, D. (2002). Sip security issues: The sip authentication procedure and its processing load. Network, IEEE, 16(6), 38–44.CrossRef
31.
go back to reference Secure Hash Standard: FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April (1995). Secure Hash Standard: FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April (1995).
32.
go back to reference Syverson, P., Cervesato, I. (2001). The logic of authentication protocols. In Foundations of security analysis and design (pp. 63–137). Springer. Syverson, P., Cervesato, I. (2001). The logic of authentication protocols. In Foundations of security analysis and design (pp. 63–137). Springer.
33.
go back to reference Thomas, M., et al. (2001) Sip security requirements. IETF Intemet dren (draftthomas-sip-sec-reg’OO. txt). Thomas, M., et al. (2001) Sip security requirements. IETF Intemet dren (draftthomas-sip-sec-reg’OO. txt).
34.
go back to reference Tsai, J. L. (2009). Efficient nonce-based authentication scheme for session initiation protocol. International Journal of Network Security, 9(1), 12–16. Tsai, J. L. (2009). Efficient nonce-based authentication scheme for session initiation protocol. International Journal of Network Security, 9(1), 12–16.
35.
go back to reference Tu, H., Kumar, N., Chilamkurti, N., & Rho, S. (2015). An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Networking and Applications, 8(5), 903–910.CrossRef Tu, H., Kumar, N., Chilamkurti, N., & Rho, S. (2015). An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Networking and Applications, 8(5), 903–910.CrossRef
36.
go back to reference Wang, X. M., Zhang, W. F., Zhang, J. S., & Khan, M. K. (2007). Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards & Interfaces, 29(5), 507–512.CrossRef Wang, X. M., Zhang, W. F., Zhang, J. S., & Khan, M. K. (2007). Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards & Interfaces, 29(5), 507–512.CrossRef
37.
go back to reference Wu, L., Zhang, Y., & Wang, F. (2009). A new provably secure authentication and key agreement protocol for sip using ecc. Computer Standards & Interfaces, 31(2), 286–291.CrossRef Wu, L., Zhang, Y., & Wang, F. (2009). A new provably secure authentication and key agreement protocol for sip using ecc. Computer Standards & Interfaces, 31(2), 286–291.CrossRef
38.
go back to reference Wu, S., Pu, Q., & Kang, F. (2013). Practical authentication scheme for sip. Peer-to-Peer Networking and Applications, 6(1), 61–74.CrossRef Wu, S., Pu, Q., & Kang, F. (2013). Practical authentication scheme for sip. Peer-to-Peer Networking and Applications, 6(1), 61–74.CrossRef
39.
go back to reference Xie, Q. (2012). A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems, 25(1), 47–54.CrossRef Xie, Q. (2012). A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems, 25(1), 47–54.CrossRef
40.
go back to reference Mishra, D., Das, A. K., & Mukhopadhyay, S. (2016). A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications, 9(1), 171–192.CrossRef Mishra, D., Das, A. K., & Mukhopadhyay, S. (2016). A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications, 9(1), 171–192.CrossRef
41.
go back to reference Yang, C. C., Wang, R. C., & Liu, W. T. (2005). Secure authentication scheme for session initiation protocol. Computers & Security, 24(5), 381–386.CrossRef Yang, C. C., Wang, R. C., & Liu, W. T. (2005). Secure authentication scheme for session initiation protocol. Computers & Security, 24(5), 381–386.CrossRef
42.
go back to reference Yeh, H. L., Chen, T. H., & Shih, W. K. (2014). Robust smart card secured authentication scheme on sip using elliptic curve cryptography. Computer Standards & Interfaces, 36(2), 397–402.CrossRef Yeh, H. L., Chen, T. H., & Shih, W. K. (2014). Robust smart card secured authentication scheme on sip using elliptic curve cryptography. Computer Standards & Interfaces, 36(2), 397–402.CrossRef
43.
go back to reference Yoon, E. J., Shin, Y. N., Jeon, I. S., & Yoo, K. Y. (2010). Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Technical Review, 27(3), 203–2013.CrossRef Yoon, E. J., Shin, Y. N., Jeon, I. S., & Yoo, K. Y. (2010). Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Technical Review, 27(3), 203–2013.CrossRef
44.
go back to reference Yoon, E. J., Yoo, K. Y., Kim, C., Hong, Y. S., Jo, M., & Chen, H. H. (2010). A secure and efficient sip authentication scheme for converged voip networks. Computer Communications, 33(14), 1674–1681.CrossRef Yoon, E. J., Yoo, K. Y., Kim, C., Hong, Y. S., Jo, M., & Chen, H. H. (2010). A secure and efficient sip authentication scheme for converged voip networks. Computer Communications, 33(14), 1674–1681.CrossRef
45.
go back to reference Das, A. K. (2016). A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications, 9(1), 223–244.CrossRef Das, A. K. (2016). A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications, 9(1), 223–244.CrossRef
46.
go back to reference Mishra, D., Das, A. K., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications, 41(18), 8129–8143.CrossRef Mishra, D., Das, A. K., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications, 41(18), 8129–8143.CrossRef
47.
go back to reference Barker, E., & Roginsky, A. (2011). SP 800–131A. Transitions: Recommendation for transitioning the use of cryptographic algorithms and key lengths. Barker, E., & Roginsky, A. (2011). SP 800–131A. Transitions: Recommendation for transitioning the use of cryptographic algorithms and key lengths.
48.
go back to reference Kocher, P., Jaffe, J., Jun, B. (1999). Differential power analysis. In Proceedings of advances in cryptology—CRYPTO’99, LNCS (vol. 1666, pp. 388–397). Kocher, P., Jaffe, J., Jun, B. (1999). Differential power analysis. In Proceedings of advances in cryptology—CRYPTO’99, LNCS (vol. 1666, pp. 388–397).
49.
go back to reference Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.MathSciNetCrossRef Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.MathSciNetCrossRef
50.
51.
go back to reference Zhang, L., Tang, S., & Cai, Z. (2014). Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. International Journal of Communication Systems, 27(11), 2691–2702. Zhang, L., Tang, S., & Cai, Z. (2014). Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. International Journal of Communication Systems, 27(11), 2691–2702.
52.
go back to reference Vanstone, S. (1992). Responses to NIST’s proposal. Communications of the ACM, 35(7), 50–52. Vanstone, S. (1992). Responses to NIST’s proposal. Communications of the ACM, 35(7), 50–52.
Metadata
Title
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
Publication date
02-08-2016
Published in
Wireless Personal Communications / Issue 3/2016
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3533-0

Other articles of this Issue 3/2016

Wireless Personal Communications 3/2016 Go to the issue