{"title":"Flaws and Amendment in an ECC-based Authentication Scheme for SIP","authors":"M. Gupta, Rahul Kumar, S. Kumari","doi":"10.1109/SMART50582.2020.9336790","DOIUrl":null,"url":null,"abstract":"In this paper, we study the pitfalls of Qiu et al.'s protocol proposed for session initiation protocol and also suggest amendment in it. We reveal that their protocol has a mistake in the mechanism of establishing the session key between the user and the server. Because of this, their protocol cannot achieve mutual authentication. The scheme also suffers from a replay attack. To recover these problems in their protocol, we propose an amended protocol to provide better security and achieve mutual authentication. The informal security analysis shows the superiority of the improved protocol over Qiu et al.'s protocol.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART50582.2020.9336790","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we study the pitfalls of Qiu et al.'s protocol proposed for session initiation protocol and also suggest amendment in it. We reveal that their protocol has a mistake in the mechanism of establishing the session key between the user and the server. Because of this, their protocol cannot achieve mutual authentication. The scheme also suffers from a replay attack. To recover these problems in their protocol, we propose an amended protocol to provide better security and achieve mutual authentication. The informal security analysis shows the superiority of the improved protocol over Qiu et al.'s protocol.