2016
DOI: 10.1007/s11042-015-3220-2
|View full text |Cite
|
Sign up to set email alerts
|

An anonymous and secure authentication and key agreement scheme for session initiation protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…In this subsection, the estimated time of the proposed scheme was compared with other related protocols [1][2][3][4]. First, a personal smart device (iPhone 6s with ARM(armv8-a) CPU, 2GB RAM, and iOS 10.1.1 operating system) was used to calculate the execution time of SHA-256, symmetric encryption/decryption operation (AES-GCM), scalar multiplication on ECC (256bits), and modular multiplication.…”
Section: Performance Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this subsection, the estimated time of the proposed scheme was compared with other related protocols [1][2][3][4]. First, a personal smart device (iPhone 6s with ARM(armv8-a) CPU, 2GB RAM, and iOS 10.1.1 operating system) was used to calculate the execution time of SHA-256, symmetric encryption/decryption operation (AES-GCM), scalar multiplication on ECC (256bits), and modular multiplication.…”
Section: Performance Discussionmentioning
confidence: 99%
“…The proposed scheme was compared with other related schemes [1][2][3][4]. The comparison results are presented in Table 2, from which it is clear that our proposed scheme performed better in terms of security features.…”
Section: The Security Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…In wireless communication, especially in the human-centered IoT environment, guaranteeing a secure SIP for the communication requires secure authentication with a key agreement protocol executed before actual communication is initiated. In order to fulfill this criterion, several SIP-based schemes have been proposed [6,12,13,32,33]. Specifically, Arshad and Nikooghadam presented an effective authentication scheme for a SIP based on elliptic curve cryptography (ECC).…”
Section: Related Workmentioning
confidence: 99%
“…In the same year, Arshad and Nikooghadam [3] also presented a single factor method. However, in 2016 Lin et al [4] showed that the method proposed by Arshad and Nikooghadam [3] is vulnerable to privilege insider attack and server spoofing attack and does not provide user anonymity. Therefore, they presented a new single factor method.…”
Section: Overview Of Recent Workmentioning
confidence: 99%