Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
A scalable key management and clustering scheme for wireless ad hoc and sensor networks
Future Generation Computer Systems
Access control management for ubiquitous computing
Future Generation Computer Systems
A new provably secure authentication and key agreement protocol for SIP using ECC
Computer Standards & Interfaces
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
Cryptanalysis of DS-SIP Authentication Scheme Using ECDH
NISS '09 Proceedings of the 2009 International Conference on New Trends in Information and Service Science
A secure and efficient SIP authentication scheme for converged VoIP networks
Computer Communications
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Future Generation Computer Systems
Cryptanalysis of a SIP authentication scheme
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Survey of security vulnerabilities in session initiation protocol
IEEE Communications Surveys & Tutorials
New directions in cryptography
IEEE Transactions on Information Theory
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
SIP security issues: the SIP authentication procedure and its processing load
IEEE Network: The Magazine of Global Internetworking
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Recently, Voice over Internet Protocol (VoIP) has been one of the more popular applications in Internet technology. For VoIP and other IP applications, issues surrounding Session Initiation Protocol (SIP) have received significant attention. SIP is a widely used signaling protocol and is capable of operating on Internet Telephony, typically using Hyper Text Transport Protocol (HTTP) digest authentication protocol. Authentication is becoming increasingly crucial because it accesses the server when a user asks to use SIP services. In this paper, we concentrate on the security flaws in the current SIP authentication procedure. We propose a secure ECC-based authentication mechanism to conquer many forms of attacks in previous schemes. By a sophisticated analysis of the security of the ECC-based protocol, we show that it is suitable for applications with higher security requirements.