Unknown

Dataset Information

0

An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.


ABSTRACT: The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

SUBMITTER: Qiu S 

PROVIDER: S-EPMC5856360 | biostudies-literature | 2018

REPOSITORIES: biostudies-literature

altmetric image

Publications

An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

Qiu Shuming S   Xu Guoai G   Ahmad Haseeb H   Guo Yanhui Y  

PloS one 20180316 3


The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromis  ...[more]

Similar Datasets

| S-EPMC6438602 | biostudies-literature
| S-EPMC5279753 | biostudies-literature
| S-EPMC6925125 | biostudies-literature
| S-EPMC7506697 | biostudies-literature
| S-EPMC5708710 | biostudies-literature
| S-EPMC4119690 | biostudies-other
| S-EPMC7309056 | biostudies-literature
| S-EPMC8293931 | biostudies-literature
| S-EPMC5831586 | biostudies-literature
| S-EPMC4515746 | biostudies-other