A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card

نویسندگان

  • Mourade Azrour
  • Yousef Farhaoui
  • Mohammed Ouanan
چکیده

In today′s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. To improve the authentication, a different authentication protocols have being proposed. Very recently, Jiang et al. demonstrate that Zhang et al.’s scheme cannot resist to impersonation attack. Then, Jiang et al. proposed their protocol. However, in this paper we show that Jiang et al.’s protocol suffer from server spoofing attack. In order to overcome this problem we propose an improved SIP authentication protocol. The security analysis shows that the proposed protocol is more secure and can deal with several attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An improved authentication protocol for session initiation protocol using smart card

The authenticated key agreement protocol is an important security protocol for the session initiation protocol, which allows the and the server to authenticate each other and generate a shared session key for privacy, integrity, and non-repudiation in their communications. Recently, Zhang et al. proposed a new authenticated key agreement protocol for the session initiation protocol using smart ...

متن کامل

Secure Key Exchange Scheme for IPTV Broadcasting

In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to descramble the scrambled program. This paper presents a secure...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

EAP AKA Authentication January 2003 The introduction of AKA inside

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

متن کامل

EAP AKA Authentication

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017