2014
DOI: 10.1002/dac.2879
|View full text |Cite
|
Sign up to set email alerts
|

An improved password‐based authentication scheme for session initiation protocol using smart cards without verification table

Abstract: Authentication schemes have been widely deployed access control and mobility management in various communication networks. Especially, the schemes that are based on multifactor authentication such as on password and smart card come to be more practical. One of the standard authentication schemes that have been widely used for secure communication over the Internet is session initiation protocol (SIP). The original authentication scheme proposed for SIP was vulnerable to some crucial security weaknesses. To ove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
29
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 39 publications
(34 citation statements)
references
References 42 publications
0
29
0
Order By: Relevance
“…There are so many researches about the performance aspects of SIP proxy servers. Because of SIP's popularity and rapidly growing deployments in the Internet Protocol (IP) networks, the SIP server overload [5][6][7][8][9][10][11][12], its security [1,2,[13][14][15][16] and session mobility [17][18][19] are the main challenges of the network. Mishra et al presents a cut-off priority queuing scheduling with a timeout method [5].…”
Section: Related Workmentioning
confidence: 99%
“…There are so many researches about the performance aspects of SIP proxy servers. Because of SIP's popularity and rapidly growing deployments in the Internet Protocol (IP) networks, the SIP server overload [5][6][7][8][9][10][11][12], its security [1,2,[13][14][15][16] and session mobility [17][18][19] are the main challenges of the network. Mishra et al presents a cut-off priority queuing scheduling with a timeout method [5].…”
Section: Related Workmentioning
confidence: 99%
“…Authenticated key exchange schemes are being widely used in various environments [1][2][3][4][5]. A number of twoparty [6][7][8][9][10][11][12][13][14][15][16][17] and three-party authenticated key agreements [18][19][20][21][22][23][24] are available. Roaming service is provided by ubiquitous networks to permit a mobile node (MN) to use the services extended by his or her home agent (HA) in a foreign agent (FA).…”
Section: Introductionmentioning
confidence: 99%
“…[]. Subsequently, a large number of smart card‐based authentication schemes are proposed [,]. The past research on authentication has ascertained that the development of a correct authentication scheme is exceptionally difficult [] as smart card is a very small device equipped with limited computation, memory, and power resources.…”
Section: Introductionmentioning
confidence: 99%
“…So authentication schemes [] based on symmetric key primitives (hash, message authentication code , exclusive or, symmetric encryption, etc.) look more desirable instead of schemes [] based on expensive asymmetric primitives (point multiplication, exponentiation, pairing, etc. ), but keeping in mind the sensitivity of tasks (e.g., financial and health care) carried out by such schemes, which are also having additional threats as compared with traditional threats, asymmetric cryptography looks more promising which can resist impersonation, password guessing, and replay attacks.…”
Section: Introductionmentioning
confidence: 99%