Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 413-419.doi: 10.11896/JsJkx.191100216

• Information Security • Previous Articles     Next Articles

SIP Authentication Key Agreement of Protocol Based on Certificateless

MO Tian-qing1 and HE Yong-mei2   

  1. 1 Communication Regiment of PAP Chongqing Corps,Chongqing 404100,China
    2 Communication Regiment of PAP Xizang Corps,Lhasa 850000,China
  • Published:2020-07-07
  • About author:MO Tian-qing, born in 1986, network engineer.Her main research interests include information security and cryptography.

Abstract: The existing authentication schemes for SIP do not resist the attack of ephemeral secrets reveal,and have high system costs.A safe communicated model of SIP network based on improved SIP was proposed.Basing on the primary flow of SIP and combing with certificateless signcryption,a new anonymous two-party authenticated key agreement protocol was adopted to achieve mutual authentication and unlinkability.Furthermore,the new protocol is provably secure in the seCK model under the CDH assumption.Comparative analysis results show that our protocol is very simple and efficient.

Key words: Authentication key agreement, Certificateless signcryption, Provably secure, SIP

CLC Number: 

  • TP393
[1] DONG Q,LUO G M,ZHU L.Research on SIP based key distribution method of private mobile communication system.Command Control &Simulation.http://kns.cnki.net/kcms/detail/32.1759.TJ.20191218.1203.004.html.2019.12.
[2] PAN W B.The Security Research of Core Network Protocol Based on Voip.BeiJing: BeiJing University of Posts and Telecommunicatons,2018.
[3] SI D F,HAN X H,LONG Q,et al.A Survey on the Core Technique and Research Development in SIP Standard.Journal of Software,2005,16(2):239-249.
[4] GUO Z H,LIU B C.Research and design of improved SIP-based authentication mechanism.Study on Optical Communications,2013,180(6):8-11.
[5] JIANG H,PAN W J,HU R L.Design of SIP AuthenticationScheme Based on Ring Signature.Computer Technology and Development,2016,26(3):140-143.
[6] ZHANG ZX,FANG B X,ZHANG H L,et al.Safe comunicated model of SIP network based on improved SIP protocol.Journal on Communication,2007,28(12):39-46.
[7] WEI Z M,FENG J C.Study on Security Authentication Mechanism for SIP.Computer Science,2008,35(11):95-97.
[8] LIU J M,GAO L J,LU G Y.Voip authentication and encryptionsystem based on SIP.Journal of Xi’an University of Posts and Telecommunications,2016,21(4):14-18.
[9] CAO Y.SIP Authentication Key Agreement Protocol Based on ECDLP.Computer Systems & Applications,2016,25(3):225-228.
[10] WEN Y Y,LUO M,ZHAO H.Research and implementation of a signcryption-based security mechanism in VoIP network.Journal on Communication,2010,31(4):8-15.
[11] LI X W.Research on Provably Secure Authenticated KeyAgreement Protocol.Xi’an: Xidian University,2013.
[12] NI L.Research on Some Issues in Authenticated Key Agreement Protocols.Shanghai: Shanghai Jiao Tong University,2012.
[13] SHU J.Design and Analysis of Authenticated Key ExchangeProtocols.Chengdu: University of Electronic Science and Technology of China,2010.
[14] SUN H Y.Authenticated Key Agreement Protocol and ITS Applications.BeiJing: BeiJing University of Posts and Telecommunicatons,2014.
[15] ZHOU Y W,YANG B,ZHANG W Z.An Improved Two-party Authenticated Certificateless Key Agreement Protocol.Chinese Journal of Computers,2017,40(5):1181-1190.
[1] ZHANG Qi-wen, WANG Zhi-qiang and ZHANG Yi-qian. Trust Collection Consensus Algorithm Based on Gossip Protocol [J]. Computer Science, 2020, 47(6A): 391-394.
[2] REN Yi. Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence [J]. Computer Science, 2020, 47(6A): 634-638.
[3] ZHANG Su-mei and ZHANG Bo-tao. Evaluation Model Construction Method Based on Quantum Dissipative Particle Swarm Optimization [J]. Computer Science, 2020, 47(6A): 84-88.
[4] YAN Hui, ZHU Bo-jing, WAN Wen, ZHONG Yin, David A YUNE. HPIC-LBM Method Based Simulation of Large Temporal-Spatial Scale 3D Turbulent Magnetic Reconnection on Supercomputer [J]. Computer Science, 2019, 46(8): 89-94.
[5] ZHANG Shi-jiang, CHAI Jing, CHEN Ze-hua and HE Hai-wu. Byzantine Consensus Algorithm Based on Gossip Protocol [J]. Computer Science, 2018, 45(2): 20-24.
[6] LIN Wang and TIAN Hong-xian. Implementation and Protocol Analysis of Embedded VoIP Voice Terminal Based on SIP [J]. Computer Science, 2016, 43(6): 86-90.
[7] CHEN Bin, MA Da-wei, YIN Cai-hua and JIANG Xue-yin. Research on Wireless Networks Mobility Management and OPNET Simulation Based on SIP [J]. Computer Science, 2015, 42(Z11): 289-291.
[8] ZHANG En, SUN Quan-dang and LIU Ya-peng. Collusion-free Rational Multi-secret Sharing Scheme [J]. Computer Science, 2015, 42(10): 164-169.
[9] LIU Jing,YE Xin-ming and MA Yuan-fei. Verification and Analysis of SIP Protocol Based on Timed Colored Petri Nets [J]. Computer Science, 2014, 41(7): 122-129.
[10] ZHANG Guo-yin,LI Jun,WANG Xiang-hui and XU Guo-kun. Improved Gossip Algorithm Based on Mobile P2P Networks [J]. Computer Science, 2013, 40(9): 103-105.
[11] . Novel Identity Based Broadcast Signcryption Scheme [J]. Computer Science, 2013, 40(2): 124-128.
[12] ZHOU Cai-xue and WANG Fei-peng. Improved Certificateless Signcryption Scheme without Pairing [J]. Computer Science, 2013, 40(10): 139-143.
[13] DAI Xiao-dong , CHEN Wen-xing. Research of the Mixed Softswitching Based on SIP and H.248 Protocol [J]. Computer Science, 2011, 38(Z10): 336-337.
[14] ZHAO Xiu-feng,XU Qiu-liang,WEI Da-Wei. Security Analysis Approaches for Group Key Agreement Protocols [J]. Computer Science, 2011, 38(6): 145-148.
[15] LI Wen-xiang,SHEN Yuan-ping,WU Jing,ZHU Han,YAN Jia-jun,ZHANG Xu. Reliable Route Selection Technique for SIP Calling Connection in Wireless Mesh Networks [J]. Computer Science, 2011, 38(4): 130-132.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!