Abstract
Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Siddiqui, K., Kamran, M., Tajammul, S.: Comparison of H.323 and Sip for Ip Telephony Signaling. In: IEEE 4th International Multioptics Conference, Lahore, Pakistan (2001)
Franks, J., Northwestern, U., Hallam-Baker, P., Hostetler, J., AbiSource, I., Lawrence, S., Agranat Systems, I., Leach, P., Microsoft, C., Luotonen, A., Netscape, C.C., Stewart, L., Open Market, I.: Http Authentication: Basic and Digest Access Authentication. IETF RFC2617 (June 1999)
Salsano, S., Veltri, L., Papalilo, D.: Sip Security Issues: The Sip Authentication Procedure and Its Processing Load. Network 16, 38–44 (2002)
Andreas, S., Daniel, K.: Sip Security,Sip Group, CH-8401 (2004)
Geneiatakis, D., Dagiuklas, T., Kambourakis, G., Lambrinoudakis, C.: Survey of Security Vulnerabilities in Session Initial Protocol. IEEE Communications Surveys & Tutorials 8(3), 68–81 (2006)
Sisalemd, D., Kuthan, J., Ehlerts, S.: Denial of Service Attacks Targeting a Sip Voip Infrastructure: Stack Scenarios and Prevention Mechanisms. Network IEEE 20(5), 26–31 (2006)
Yang, C.-C., Wang, R.-C., Liu, W.-T.: Secure Authentication Scheme for Session Initiation Protocol. Comput Secur. 24, 381–386 (2005)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. Ieee T. Inform. Theory 22, 644–654 (1976)
Durlanik, A., Sogukpinar, I.: Sip Authentication Scheme Using Ecdh. In: 2005: Proceedings of World Academy of Science. Engineering And Technology (October 2005)
Kong, L., Balasubramaniyan, V.B., Ahamad, M.: A Lightweight Scheme for Securely and Reliably Locating Sip Users. In: VoIP Management and Security, IEEE Workshop, pp. 9–17 (2006)
Ring, J., Raymond Choo, K.-K., Foo, E., Looi, M.: A New Authentication Mechanism and Key Agreement Protocol for Sip Using Identity Based Cryptography. In: Proceedings of AusCERT R&D Stream, pp. 61–72 (2006)
Srinivasan, R., Vaidehi, V., Harish, K., Lakshmi-Narasimhan, K., LokeshwerBabu, S., Srikanth, V.: Authentication of Signaling in Voip Applications. In: Communications, Asia-Pacific Conference, pp. 530–533 (2005)
Vesterinen, P.: User Authentication in Sip. In TKK T-110.5290 Seminar on Network Security, pp. 11–12 (2006)
Yoon, E.J., Yoo, K.Y.: Cryptanalysis of Ds-Sip Authentication Scheme Using Ecdh. In: International Conference on New Trends in Information and Service Science, pp. 642–647 (2009)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Li, J.H., Bhattacharjee, B., Yu, M., Levy, R.: A Scalable Key Management and Clustering Scheme for Wireless Ad Hoc and Sensor Networks. Future Gener. Comp. Sy. 24, 860–869 (2008)
Chen, L., Kudla, C.: Identity Based Authenticated Key Agreement Protocol from Pairings. In: CSFW 2003, pp. 213–219. IEEE Computer Society Press, Los Alamitos (2003)
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, Springer, Heidelberg (2003)
Wang, H., Zhang, Y., Cao, J.: Access Control Management for Ubiquitous Computing. Future Gener. Comp. Sy. 24, 870–878 (2008)
Janzadeh, H., Fayazbakhsh, K., Dehghan, M., Fallah, M.S.: A Secure Credit-Based Cooperation Stimulating Mechanism for Manets Using Hash Chains. Future Gener. Comp. Sy. 25, 926–934 (2009)
Wang, F., Zhang, Y.: A New Provably Secure Authentication and Key Agreement Mechanism for Sip Using Certificateless Public-Key Cryptography. Computer Communications 31, 2142–2149 (2008)
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Tsai, J.-L.: Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol. International Journal of Network Security 9(1), 12–16 (2009)
Lee, C.C.: On Security of an Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol. International Journal of Network Security 9, 201–203 (2009)
Chen, T.-H., Hsiang, H.-C., Shih, W.-K.: Security Improvement on a Remote User Authentication Scheme Using Smart Cards. In: Bandyopadhyay, S.K., Adi, W., Kim, T.-h., Xiao, Y. (eds.) ISA 2010. Communications in Computer and Information Science, vol. 76, pp. 9–16. Springer, Heidelberg (2010)
Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 46, 28–30 (2000)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 50, 612–614 (2004)
Lee, S.W., Kim, H.S., Yoo, K.Y.: Improved Efficient Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 50, 565–567 (2004)
Chen, T.H., Hsiang, H.C., Shih, W.K.: Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards. In: Future Gener. Comp. System, (in press) Accepted Manuscript doi:10.1016/j.future.2010.08.007
Rosenberg, J., Schulzeinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: Sip: Session Initiation Protocol. IETF RFC3261 (2002)
Handley, M., Schulzrinne, H., Schooler, C.U.E., Tech, C., Rosenberg, J., Bell, L.: Sip: Session Initiation Protocol. In: IETF RFC2543 (March 1999)
I.T Union, Packet Based Multimedia Communication Systems, in: Recommendation H.323, Telecommunication Standardization Sector of Itu, Geneva, Switzerland (Febuary 1998)
Schulzrinne, H., Rosenberg, J.: A Comparison of Sip and H.323 for Internet Telephony. In: International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV), Cambridge, England, pp. 83–86 (July 1998)
Wu, L., Zhang, Y., Wang, F.: A New Provably Secure Authentication and Key Agreement Protocol for Sip Using Ecc. Computer Standards & Interfaces 31, 286–291 (2009)
Chen, T.-H., Shih, W.K.: A Robust Mutual Authentication Protocol for Wireless Sensor Networks. ETRI Journal 32 (2010 to be published.)
Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comput. 48, 203–209 (1987)
Menezes, A., Oorschot, P.V., Sa, V.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1997)
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, p. 417. Springer, Heidelberg (1986)
Bodei, C., Degano, P., Focardi, R., Priami, C.: Authentication Primitives for Secure Protocol Specifications. Future Gener. Comp. Sy. 21, 645–653 (2005)
Lin, I.-C., Hwang, M.-S., Li, L.-H.: A New Remote User Authentication Scheme for Multi-Server Architecture. Future Gener. Comp. Sy. 19, 13–22 (2003)
Chen, T.-H., Chen, Y.-C., Shih, W.-K.: An Advanced Ecc Id-Based Remote Mutual Authentication Scheme for Mobile Devices. In: The 2010 International Symposium on Service, Security and its Data management technologies in Ubi-com (SSDU), Xi’an, China (2010)
Lee, W., Lee, J.: Design and Implementation of Secure E-Mail System Using Elliptic Curve Cryptosystem. Future Gener. Comp. Sy. 20, 315–326 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, Th., Yeh, Hl., Liu, Pc., Hsiang, Hc., Shih, Wk. (2010). A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography. In: Kim, Th., Chang, A.CC., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17587-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-17587-9_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17586-2
Online ISBN: 978-3-642-17587-9
eBook Packages: Computer ScienceComputer Science (R0)