z-logo
open-access-imgOpen Access
An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
Author(s) -
Yu Lu,
Dawei Zhao
Publication year - 2022
Publication title -
mathematical biosciences and engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.451
H-Index - 45
eISSN - 1551-0018
pISSN - 1547-1063
DOI - 10.3934/mbe.2022003
Subject(s) - computer science , key agreement protocol , elliptic curve cryptography , oakley protocol , protocol (science) , authentication (law) , authentication protocol , key (lock) , computer network , session initiation protocol , computer security , cryptography , cryptographic protocol , public key cryptography , server , encryption , key distribution , universal composability , medicine , alternative medicine , pathology
Designing a secure authentication scheme for session initial protocol (SIP) over internet protocol (VoIP) networks remains challenging. In this paper, we revisit the protocol of Zhang, Tang and Zhu (2015) and reveal that the protocol is vulnerable to key-compromise impersonation attacks. We then propose a SIP authenticated key agreement protocol (AKAP) using elliptic curve cryptography (ECC). We demonstrate the correctness of the protocol using Burrows-Abadi-Needham (BAN), and its security using the AVISPA simulation tool. We also evaluate its performance against those of Zhang, Tang and Zhu, and others.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here