scispace - formally typeset
Journal ArticleDOI

A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography

Reads0
Chats0
TLDR
By a sophisticated analysis of the security of the proposed protocol, it is shown that the proposed authentication scheme with anonymity using elliptic curve cryptograph not only overcomes weaknesses in previous schemes but also is very efficient, suitable for applications with higher security requirements.
Abstract
As a signaling protocol for controlling communication on the internet, establishing, maintaining, and terminating the sessions, the Session Initiation Protocol (SIP) is widely used in the world of multimedia communication. To ensure communication security, many authentication schemes for the SIP have been proposed. However, those schemes cannot ensure user privacy since they cannot provide user anonymity. To overcome weaknesses in those authentication schemes with anonymity for SIP, we propose an authentication scheme with anonymity using elliptic curve cryptograph. By a sophisticated analysis of the security of the proposed protocol, we show that the proposed scheme not only overcomes weaknesses in previous schemes but also is very efficient. Therefore, it is suitable for applications with higher security requirements.

read more

Citations
More filters
Journal ArticleDOI

Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects

TL;DR: Existing emerging vulnerabilities of blockchain related to the recent attacks on bitcoin and etherum is presented along with the defensive methodologies and future trends in blockchain are presented.
Journal ArticleDOI

An efficient data integrity auditing protocol for cloud computing

TL;DR: An efficient approach for data integrity auditing in cloud computing is proposed and the results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources.
Journal ArticleDOI

Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing

TL;DR: This work proposes a secure, Fog computing based publish-subscribe lightweight protocol using Elliptic Curve Cryptography (ECC) for the Internet of Things and presents analytical proofs and results for resource efficient security, comparing to the existing protocols of traditional Internet.
Journal ArticleDOI

LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment

TL;DR: A novel Lightweight AKE Protocol for IoD Environment (LAKE-IoD) is presented, which first ensures the authenticity of MU and also renders session key establishment mechanism between MU and drone with the help of a server, and is protected against different well-known active and passive security attacks.
Journal ArticleDOI

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography

TL;DR: An efficient lightweight signcryption scheme based on HECC which fulfills all the security requirements and reduced significant amounts of computation, communication costs and message size as compared to existing signc encryption schemes making it the good candidate for environments suffer from the resource limitation problems.
References
More filters
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI

Use of Elliptic Curves in Cryptography

TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.

HTTP Authentication: Basic and Digest Access Authentication

TL;DR: "HTTP/1.0", includes the specification for a Basic Access Authentication scheme, which is not considered to be a secure method of user authentication (unless used in conjunction with some external secure system such as SSL [5]), as the user name and password are passed over the network as cleartext.
Journal Article

Elliptic curve cryptosystem

TL;DR: The technology for parameter generation of a secure ECC and the implementation of a fast ECC by software and by a digital signal processor are described.
Journal ArticleDOI

A More Secure Authentication Scheme for Telecare Medicine Information Systems

TL;DR: This work proposes an improved scheme for authentication scheme for mobile devices in telecare medicine information system that is not only more secure than Wu et al.
Related Papers (5)