2018
DOI: 10.1007/s11042-018-6620-2
|View full text |Cite
|
Sign up to set email alerts
|

Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme

Abstract: In this research, we have tried to first focus on the previous work and after getting familiar with the base papers, focus on the main paper. In this paper, we try to determine the security problems in the proposed protocols and present appropriate solutions for them. One of the subjects studied by security and encryption researchers is the matter of authentication and key agreement in SIP. Recently, an authentication and key agreement protocol in SIP has been presented in a scheme. In this paper, it was prove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 40 publications
0
18
0
Order By: Relevance
“…The communication cost of the proposed scheme is determined by the total number of bits in transmitting messages between the user and the server. From paper Reference 36, we consider that the size of hash function, elliptic curve point multiplication, and encryption/decryption operation are 160 bits, 320 bits, and 128 bits, respectively. The communication cost of sending timestamp and the random number is 32 bits.…”
Section: Performance Analysismentioning
confidence: 99%
“…The communication cost of the proposed scheme is determined by the total number of bits in transmitting messages between the user and the server. From paper Reference 36, we consider that the size of hash function, elliptic curve point multiplication, and encryption/decryption operation are 160 bits, 320 bits, and 128 bits, respectively. The communication cost of sending timestamp and the random number is 32 bits.…”
Section: Performance Analysismentioning
confidence: 99%
“…However, their scheme was not able to provide perfect forward secrecy. Perfect forward secrecy refers to the feature in typical authentication and key agreement protocols, which guarantees that if any long term such as the server's secret key is compromised, the session keys will not be compromised 22–24 . In 2018, Mishra et al 25 presented an authentication scheme for multimedia communications in IoT‐based wireless sensor networks which had low computational complexity but was not able to guarantee perfect forward secrecy provision.…”
Section: Related Workmentioning
confidence: 99%
“…As mentioned in Ravanbakhsh et al, 22 resistance against known‐session‐specific temporary information attack implies that if session random numbers r1 and r2 are unexpectedly disclosed to the attacker, he should not be able to retrieve the session key SK. As mentioned in step 5 of the authentication phase, the session key SK=r1.P3=r1.r2.G.…”
Section: Cryptanalysis Of the Scheme Of Kumari Et Almentioning
confidence: 99%
See 2 more Smart Citations