Robust and Efficient Authentication Scheme for Session Initiation Protocol
نویسندگان
چکیده
منابع مشابه
A New Efficient Authentication Scheme for Session Initiation Protocol
Today, the efficiency and security of session initiation protocol is becoming more and more important. In 2005, Yang et al. proposed a secure authentication scheme for session initiation protocol. However, it is not suitable for the limited computation capacities of users such as smart cards or mobile units. To guarantee the quality of the growing communication services, we propose an efficient...
متن کاملEfficient Nonce-based Authentication Scheme for Session Initiation Protocol
In recent years, Session Initiation Protocol (SIP) is more and more popular. However, there are many security problems in the Session Initiation Protocol. In 2005, Yang et al. [9] proposed a secure authentication scheme for Session Initiation Protocol. This authentication scheme is based on Diffie-Hellman [2] concept, so the computation cost of this authentication scheme is very high. In order ...
متن کاملSecure authentication scheme for session initiation protocol
Department of Management Information System, National Chung Hsing University, 250, Kuo Kuang Rd., Taichung, 413 Taiwan, ROC Department of Information Management, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung County, 413 Taiwan, ROC Graduate Institute of Networking and Communication Engineering, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung Cou...
متن کاملBiometrics based authentication scheme for session initiation protocol
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed ...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2015
ISSN: 1024-123X,1563-5147
DOI: 10.1155/2015/894549