Weakness in Zhang et al.’s authentication protocol for session initiation protocol

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Authentication is the most security service required by Session Initiation Protocol (SIP). In recently years, Zhang et al. proposed for the first time an efficient and flexible authentication protocol for SIP using smart card and Elliptic Curve Cryptography. But, in 2014, Zhang et al. showed that their latest proposed protocol is vulnerable to impersonation attack. In order to improve their protocol, Zhang et al. proposed a second protocol. However, in this work we demonstrate that Zhang et al.’s protocol is vulnerable to server spoofing attack. Furthermore to overcome the weakness of Zhang et al.’s protocol we propose an improved and secured SIP authentication and key exchange protocol. The security analysis shows that our proposed protocol can resist to various attack including server spoofing attack.

Cite

CITATION STYLE

APA

Azrour, M., Farhaoui, Y., & Ouanan, M. (2018). Weakness in Zhang et al.’s authentication protocol for session initiation protocol. In Lecture Notes in Networks and Systems (Vol. 25, pp. 239–251). Springer. https://doi.org/10.1007/978-3-319-69137-4_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free