| Literature DB >> 29547619 |
Shuming Qiu1,2, Guoai Xu1, Haseeb Ahmad3, Yanhui Guo1.
Abstract
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.Entities:
Mesh:
Year: 2018 PMID: 29547619 PMCID: PMC5856360 DOI: 10.1371/journal.pone.0194072
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Positional relation of the proposed scheme.
Notations and abbreviations.
| Symbol | Description |
|---|---|
| Server | |
| Patient/User | |
| Identity of | |
| Password of | |
| Random numbers of | |
| Secret key of | |
| Random numbers of | |
| || | The string concatenation operation |
| ⊕ | The bitwise XOR operation |
|
| Malicious adversary |
| Collision free one-way hash function | |
| → | An insecure channel |
| ⇒ | A secure channel |
| Session key between |
Fig 2Registration and authentication phase of our scheme.
Fig 3Architecture of the AVISPA tool.
Fig 4Role specification of U in HLPSL.
Fig 5Role specification of S in HLPSL.
Fig 6Role specification of the session, goal and environment in HLPSL.
Fig 7The simulation result using the OFMC backend.
Fig 8The simulation result using the CL-AtSe backend.
Comparison of computational complexity in login-authentication phase.
| Scheme | User computations | Server computations | Total of computation overhead |
|---|---|---|---|
| Zhang et al. [ | 4 | 4 | 8 |
| Jiang et al. [ | 5 | 4 | 9 |
| Irshad et al. [ | 6 | 6 | 12 |
| Chaudhry et al. [ | 5 | 5 | 10 |
| Tu et al. [ | 4 | 4 | 8 |
| Zhang et al. [ | 6 | 4 | 10 |
| Farash [ | 5 | 4 | 9 |
| Kumari et al. [ | 5 | 5 | 10 |
| Ours | 7 | 5 | 13 |
Comparison of security features.
| Security features | Zhang et al. [ | Jiang et al. [ | Irshad et al. [ | Chaudhry et al. [ | Tu et al. [ | Zhang et al. [ | Farash [ | Kumari et al. [ | Ours |
|---|---|---|---|---|---|---|---|---|---|
| No | No | Yes | No | No | No | No | Yes | Yes | |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |
| No | No | No | No | No | No | No | No | Yes | |
| □ | □ | □ | □ | □ | □ | □ | No | Yes | |
| Yes | Yes | No | Yes | No | □ | Yes | Yes | Yes | |
| No | No | Yes | Yes | No | Yes | No | Yes | Yes | |
| Yes | No | No | Yes | No | Yes | No | Yes | Yes | |
| Yes | Yes | No | □ | No | Yes | No | Yes | Yes | |
| Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | |
| No | No | No | No | No | No | No | No | Yes |
F1: Provides user anonymity and user un-traceability; F2: Resists privileged insider attack; F3: Provides pre-verification in the smart card; F4: Resists key-compromise impersonation attack; F5: Resists server impersonation attack; F6: Resists off/On-line password guessing attack; F7: Resists replay attack; F8: Resists session-specific temporary information attack; F9: Resists man-in-the-middle attack; F10: Provides mutual authentication; F11: Provides perfect forward secrecy; F12: Provides efficient password changing. “Yes” means the property is satisfied; “No” means the property is not satisfied and “▫” means the property is not discussed.