Abstract
The Session Initiation Protocol (SIP) is the most widely used signaling protocol for controlling communication on the internet, establishing, maintaining, and terminating the sessions. The services that are enabled by SIP are equally applicable in the world of multimedia communication. Recently, Tsai proposed an efficient nonce-based authentication scheme for SIP. In this paper, we do a cryptanalysis of Tsai’s scheme and show that Tsai’s scheme is vulnerable to the password guessing attack and stolen-verifier attack. Furthermore, Tsai’s scheme does not provide known-key secrecy and perfect forward secrecy. We also propose a novel and secure mutual authentication scheme based on elliptic curve discrete logarithm problem for SIP which is immune to the presented attacks.



Similar content being viewed by others
References
Arkko J, Torvinen V, Camarillo G, Niemi A, Haukka T (2002) Security mechanism agreement for SIP sessions. IETF Internet Draft (draft-ietf-sip-sec-agree-04.txt)
Damgard I (1989) A design principle for hash functions. Advances in Cryptology, CRYPTO’89, LNCS 1989, (435): 416–427
Diffie W, Hellman M (1976) New directions in cryptology. IEEE Transaction on Information Theory 22(6)
Durlanik A, Sogukpinar I (2005) SIP Authentication Scheme using ECDH. World Enformatika Socity Trans Eng Comput Technol 8:350–353
Franks J, Hallam-Baker P, Hostetler J, Lawrence S, Leach P, Luotonen A (1999) HTTP authentication: basic and digest access authentication. IETF RFC2617
Geneiatakis D, Dagiuklas T, Kambourakis G, Lambrinoudakis C, Gritzalis S, Ehlert S (2006) Survey of security vulnerabilities in session initiation protocol. IEEE Commun Surv Tutorials 8(3):68–81
Handley M, Schulzrinne H, Schooler E, Rosenberg J (1999) SIP: session initiation protocol. IETF RFC2543
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:417–426
Lee CC (2009) On security of an efficient nonce based authentication scheme for SIP. Int J Netw Secur 9(3):201–203
Lin CL, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68–72
Lu R, Cao Z (2006) Off-line password guessing attack on an efficient key agreement protocol for secure authentication. Int J Netw Secur 3(1):35–38
Lu R, Cao Z (2008) A simple user authentication scheme for grid computing. Int J Netw Secur 7(2):202–206
Rosenberg J, Schulzrinne H, Camarillo G, Johnstone A, Peterson J, Sparks R (2002) SIP: session initiation protocol. IETF RFC3261
Thomas M (2001) SIP security requirements. IETF Internet Draft (draftthomas-sip-sec-reg-00. txt) (work in progress)
Toorani M, Shirazi AAB (2009) A directly public verifiable signcryption scheme based on elliptic curves. Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 09), pp. 713–716
Tsai JL (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8(3):312–316
Veltri L, Salsano S, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16(6):38–44
Wang B, Li ZQ (2006) A forward-secure user authentication scheme with smart cards. Int J Netw Secur 3(2):116–119
Yang CC, Wang RC, Liu WT (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381–386
Yoon EJ, Yoo KY (2009) A new authentication scheme for session initiation protocol. 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009), pp. 549–544
Yoon EJ, Shin YN, Jeon IS, Yoo KY (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27(3):203–213
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Arshad, R., Ikram, N. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66, 165–178 (2013). https://doi.org/10.1007/s11042-011-0787-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-011-0787-0