Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography

نویسندگان

  • Hsiu-lien Yeh
  • Tien-Ho Chen
  • Wei-Kuan Shih
چکیده

In 2014, Yeh et al. proposed a robust smart card secured authentication scheme on SIP using elliptic curve cryptography to conquer many forms of attacks in previous protocols. Yeh et al. claimed that their proposed protocol is more efficient than Diffie-Hellman’s concept authentication protocols for SIP and performs secured mutual authentication, which can be implemented on different real network environments such as VoIP. However, this paper points out that Yeh et al.’s protocol not only suffers from stolen smart card attack, but also does not provide perfect forward secrecy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance

Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestampbased remote user authentication scheme to eliminate the attacks in Shen et al.’s. However, we find that their scheme is vulnerable to the privileged insider, the lost smart card, the password guessing, the replay, the modifica...

متن کامل

Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'

Authentication plays an important role in an open network environment in order to authenticate two communication parties among each other. Authentication protocols should protect the sensitive information against a malicious adversary by providing a variety of services, such as authentication, user credentials’ privacy, user revocation and re-registration, when the smart card is lost/stolen or ...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison

Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming...

متن کامل

Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance

Smart card-based user authentication is a useful mechanism for performing private session over an insecure network. Tang et al have proposed a robust and efficient scheme in 2013 that is based on elliptic curve discrete logarithm problem (ECDLP). It is for eliminating the attack in Awasthi et al’s scheme. However, Tang et al’s scheme is still vulnerable to denial of service attack and off-line ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Standards & Interfaces

دوره 36  شماره 

صفحات  -

تاریخ انتشار 2014