Acknowledgement
Supported by : Natural Science Foundation of China
References
- Kilinc H H, Yanik T., "A Survey of SIP Authentication and Key Agreement Schemes [J]," Communications Surveys & Tutorials, IEEE, 16(2): 1005-1023, 2014. https://doi.org/10.1109/SURV.2013.091513.00050
- Franks J, Hallam-Baker P, Hostetler J, et al., "HTTP authentication: Basic and digest access authentication [Z]," RFC 2617, June, 1999.
- Li J, Kao C, Tzeng J., "VoIP secure session assistance and call monitoring via building security gateway [J]," International Journal of Communication Systems, 24(7): 837-851, 2011. https://doi.org/10.1002/dac.1191
- Farash MS, Attari MA, "An enhanced authenticated key agreement for session initiation protocol," Inform Techno Control, 42(4):333-342, 2013.
- Jiang Q, Ma J, Tian Y., "Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al [J]," International Journal of Communication Systems, 28(7): 1340-1351, 2015. https://doi.org/10.1002/dac.2767
- Chen CL, Lee CC, Hsu CY., "Mobile device integration of a fingerprint biometric remote authentication scheme [J]," International Journal of Communication Systems, 25(6):585-597, 2012. https://doi.org/10.1002/dac.1277
- Jiang Q, Ma J, Li G, et al., "An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks [J]," Wireless Personal Communications, 68(4): 1477-1491, 2013. https://doi.org/10.1007/s11277-012-0535-4
- Yang CC, Wang RC, Liu WT., "Secure authentication scheme for session initiation protocol [J]," Computers & Security, 24(5):381-386, 2005. https://doi.org/10.1016/j.cose.2004.10.007
- Durlanik A, Sogukpinar I., "SIP authentication scheme using ECDH [C]," in Proc. of World Academy of Science, Engineering and Technology, 8:350-353, 2005.
- Yoon EJ, Yoo KY., "Cryptanalysis of DS-SIP authentication scheme using ECDH [C]," in Proc. of International Conference on New Trends in Information and Service Science, Beijing, 642-647, 2009.
- Wu L, Zhang Y, Wang F., "A new provably secure authentication and key agreement protocol for SIP using ECC [J]," Comput Stand Interfaces, 31(2):286-291, 2009. https://doi.org/10.1016/j.csi.2008.01.002
- Yoon EJ, Yoo KY, Kim C, Hong Y, Jo M, Chen H., "A secure and efficient SIP authentication scheme for converged VoIP networks [J]," Comput Commun, 33(14):1674-1681, 2010. https://doi.org/10.1016/j.comcom.2010.03.026
- Jaeduck C, Souhwan J, Kwangyong B, et al., "A lightweight authentication and hop-by-hop security mechanism for SIP network[C]," in Proc. of Advanced Technologies for Communications, International Conference on, Hanoi, (1): 235-238, 2008.
- Xie Q., "A new authenticated key agreement for session initiation protocol [J]," Int J Commun Syst., 25(1):47-54, 2012. https://doi.org/10.1002/dac.1286
- Chaudhry SA, Farash MS, Naqvi H, Sher M., "A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography," Electronic Commerce Research, 16(1):113-139, 2016. https://doi.org/10.1007/s10660-015-9192-5
- Acquist A, Brandimarte L, Loewenstein G., "Privacy and human behavior in the age of information [J]," Science, 347(6221):509-514, 2015. https://doi.org/10.1126/science.aaa1465
- Hughes D, shmatukov V., "Information hiding, anonymity and privacy: a modular approach [J]," Journal of Computer Security, 12(1):3-36, 2014.
- He D, Chen C, Bu J, et al., "Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects [J]," Communications Magazine, IEEE, 51(2): 142-150, 2013.
- Wang RC, Juang WS, Lei CL., "Robust authentication and key agreement scheme preserving the privacy of secret key [J]," Computer Communications, 34(3): 274-280, 2011. https://doi.org/10.1016/j.comcom.2010.04.005
- Arshad H, Nikooghadam M., "An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC [J]," Multimedia Tools and Applications, 1-17, 2014.
- Irshad A, Sher M, Faisal M S, et al., "A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme [J]," Security and Communication Networks, 7(8): 1210-1218, 2014. https://doi.org/10.1002/sec.834
- Burrows M, Abadi M, "Needham RM., "A logic of authentication[C]," in Proc. of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, The Royal Society, 426(1871): 233-271, 1990.
- Khan M K, He D., "A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography [J]," Security and Communication Networks, 5(11): 1260-1266, 2012.
- Zhang Y, Chen J, Huang B, et al., "An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography [J]," Information Technology and Control, 43(4): 390-401, 2014.
- Zhang L, Tang S, Cai Z., "Cryptanalysis and improvement of password authenticated key agreement for session initiation protocol using smart cards [J]," Security and Communication Networks, 7(12): 2405-2411, 2014. https://doi.org/10.1002/sec.951
- Zhang L, Tang S, Cai Z., "Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card [J]," International Journal of communication systems, 27(11): 2691-2702, 2014. https://doi.org/10.1002/dac.2499
- Li, X., Niu, J., Liao, J. and Liang, W., "Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update," International Journal of Communication Systems, 28(2), pp.374-382, 2015. https://doi.org/10.1002/dac.2676
- Zhang L, Tang S, Chen J, et al., "Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography[J]," Wireless Personal Communications, 1-23, 2014.
- Tang H, Liu X., "Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol [J]," Multimedia tools and applications, 65(3): 321-333, 2013. https://doi.org/10.1007/s11042-012-1001-8
- Koblitz N, Menezes A, Vanstone S., "The state of elliptic curve cryptography [M]," Towards a Quarter-Century of Public Key Cryptography, Springer US, 103-123, 2000.
- Li, X., Niu, J., Khan, M.K., Liao, J. and Zhao, X., "Robust three-factor remote user authentication scheme with key agreement for multimedia systems," Security and Communication Networks, 13(9), pp.1916-1927, 2016.
- Li X, Niu J, Kumari S, Liao J, Liang W., "An enhancement of a smart card authentication scheme for multi-server architecture," Wireless Personal Communications, Jan 1;80(1):175-192, 2015. https://doi.org/10.1007/s11277-014-2002-x
Cited by
- An improved and efficient mutual authentication scheme for session initiation protocol vol.14, pp.3, 2019, https://doi.org/10.1371/journal.pone.0213688