| Literature DB >> 30921341 |
Yuanyuan Zhang1, Kunming Xie1, Ou Ruan1.
Abstract
Qiu et al. made a security analysis about the protocols of Chaudhry et al. and Kumari et al. in 2018, and they pointed out that there are many security weaknesses in the protocols. To improve the security, Qiu et al. proposed an advanced authentication scheme for Session Initiation Protocol on the basis of the previous protocols and claimed that their own protocol was very secure and practical. However, we demonstrate that the protocol of Qiu et al. has a serious mistake which causes their protocol cannot be executed normally. Beyond that, we also find out that their protocol cannot withstand insider attack and denial service attack. In order to remove these weaknesses, we propose an efficient provably secure mutual authentication scheme. Furthermore, our scheme provides security analysis with the help of Burrows-Abadi-Needham (BAN) logic. Compared with their protocol, ours has greater security and better performance.Entities:
Mesh:
Year: 2019 PMID: 30921341 PMCID: PMC6438602 DOI: 10.1371/journal.pone.0213688
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
The notations of the schemes.
| Symbol | Description |
|---|---|
| A legitimate user | |
| The remote server | |
| The identity of the | |
| The password of the | |
| The secret key of the | |
| The private key of the | |
| The public key of the | |
| A one-way hash function | |
| String concatenation operation | |
| The bitwise XOR operation | |
| The session key between |
Fig 1Registration phase.
Fig 2Login and authentication phase.
Fig 3Password update phase.
Notations of symbol.
| Symbol | Description |
|---|---|
| P|≡X | P believes X |
| P⇒X | P has jurisdiction over X |
| #(X) | X is fresh |
| P⊲X | P sees X |
| P|~X | P once said X |
| (X,Y) | X or Y belongs to (X, Y) |
| (X)K | X is hash with the key K |
| P communicates with Q using key K |
Notations of formula.
| The message meaning rule | |
| The freshness rule | |
| The nonce-verification rule | |
| The jurisdiction rule | |
| The believe rule |
Fig 4Time consumption comparison of other scholars' protocols and ours.
Comparison of our scheme and others.
| Phase | Our scheme | Qiu et al.’s protocol [ | Chaudhry et al.'s protocol [ | Kumari et al.'s protocol [ |
|---|---|---|---|---|
| Registration phase | ||||
| Authentication phase | ||||
| Password update phase | ||||
| Total |