Abstract

Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.’s protocol is exposed against server masquerading attack and user’s masquerading attack. Moreover, it also fails to protect the user’s identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user’s privacy, user’s masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

Highlights

  • The applications of multimedia services have great significance in advanced networks

  • Authentication process is performed by the users in order to login the server through Session Initiation Protocol (SIP)

  • The authentication plays a vital role for the SIP protocol services

Read more

Summary

Introduction

The applications of multimedia services have great significance in advanced networks. Yoon et al [20] demonstrated that Durlanik and Sogukpinar as well as Wu et al.’s proposed protocols are not secure against Denning-Sacco [21], off-line password guessing and stolen verifier attacks. Though Yoon et al [25] presented a robust authentication technique with a key agreement to address the limitations of Tsai’s scheme, yet Yoon et al.’s scheme is found unprotected against off-line password guessing and stolen verifier attacks indicated by Xie [26] and introduced a new scheme. Xie’s protocol is exposed against off-line password guessing and impersonation attacks indicated by Farash and Attari [27] They proposed a new technique to counter the limitations of Xie’s scheme.

A random number r1 is generated and computed by Ui:
Ui computes:
User anonymity attack
Server masquerading attack
User masquerading attack
Incorrectness problem
Proposed scheme
Authentication phase
Informal security analysis
Formal security analysis
The probability of success for the said experiment
12: Accept the deduced
Communication cost analysis
Security comparison
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.