...
首页> 外文期刊>Journal of supercomputing >Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
【24h】

Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP

机译:通过voIP中的SIP基于ECC的身份验证方案完善的前向保密

获取原文
获取原文并翻译 | 示例

摘要

With the advent of the internet, Voice over Internet Protocol (VoIP) has obtained a considerable amount of attention due to its low cost, and ease of implementation. Similar to other emerging technologies, VoIP faces several challenges, including security in terms of confidentiality, integrity, and authenticity. Specifically, there is a need for secure and efficient authentication and key agreement scheme to address the security requirements of communications over VoIP networks. Recently, Ravanbakhsh et al. have presented an authentication and key agreement protocol for VoIP networks. Here, in this article, we first prove that Ravanbakhsh et al.'s scheme cannot provide perfect forward secrecy. Next, we present an elliptic curve cryptography-based secure two-factor authentication and key agreement scheme. We analyze the security of the proposed scheme informally, and demonstrate that the proposed scheme can provide different security features, including perfect forward secrecy, and is robust against security attacks such as the impersonation attack, the replay attack, and the stolen-verifier attack. Furthermore, we simulate the protocol and analyze its security formally using Scyther tool. The results show its robustness against different attacks, and its ability to provide perfect forward secrecy. We compare the computation cost of the proposed scheme with the related schemes. Results show that the proposed scheme achieves a satisfiable performance comparable to other ECC-based methods.
机译:随着互联网的出现,由于其低成本和易于实现,互联网协议的声音(VoIP)已经获得了相当大的关注。类似于其他新兴技术,VoIP面临着几种挑战,包括在机密性,完整性和真实性方面的安全性。具体地,需要安全和有效的认证和密钥协议方案,以解决通过VoIP网络的通信的安全要求。最近,Ravanbakhshs等。为VoIP网络提出了身份验证和关键协议协议。在这里,在本文中,我们首先证明了Ravanbakhshs等人。的计划不能提供完美的前锋保密。接下来,我们提出了一种基于椭圆曲线的安全双因素认证和密钥协议方案。我们非正式地分析了所提出的方案的安全性,并证明该方案可以提供不同的安全功能,包括完善的前锋保密,并且对诸如模拟攻击,重播攻击和盗窃者攻击等安全攻击是强大的。此外,我们模拟了协议,并使用SCYTHER工具正式分析其安全性。结果表明其对不同攻击的鲁棒性,以及提供完美前锋保密的能力。我们将所提出的方案的计算成本与相关方案进行比较。结果表明,该方案达到了与其他基于ECC的方法相当的满足性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号