What is it about?

Secure information sharing has become very popular in immigration, military applications, healthcare, education and foreign affairs for the past few years. Security and privacy cannot be easily compromised because the secure communication utilizes both wireless and wired communication media for exchanging sensitive information. To improve the security, integrity, authenticity and privacy issues while sharing of information, numerous authentication procedures or set-of-rules have been recommended by different researchers in recent times. The authentication protocols are vulnerable to prospective security flaws e.g. replay attack, masquerading, insider attack, impersonation, password guessing, server spoofing, Denning Sacco and denial-of-service (DoS). Further, these mechanisms also fail to deliver mutual authentication. Almost, no researcher claims with conviction about a foolproof secure authentication protocol. This research mainly focuses on designing a protocol that attains low computation costs, low communication complexity and low storage overhead than other existing and related protocols and shows a significant balance between performance and security. The proposed protocol also offers mutual authentication and reliable information delivery between user and server. A provable security analysis for the proposed protocol has also been established mathematically using BAN logic of authentication.

Featured Image

Why is it important?

Application program commonly monitors task scheduling fragment of each part, authenticate the user recorded data and finally post a message to remote server platforms for communication [1]. The user interfaces part of the application programs designed for end users to understand, operate and specifically to interface with a remote server for easy communication of aforementioned activities. Afterward the server gets demands from clients, accomplishes record repossession, renews and regulates data integrity and finally posts replies to the clients. The server works like a software powerhouse that controls software, provides database facilities, controls printing devices, monitor communication line and enhance the performance of high powered processor (CPU). The key aim of the server is to complete the back-end responsibilities that are mutual to related applications and users. Network Operating System installed in the server facilitates service areas, such as direction-finding, delivery, messaging, communication supervision services, and guidelines for different tasks [2]. Subsequently, the somatic link is detected, recognized and transfer control protocol (TCP) is carefully chosen for mutual authentication between the server and the client. Therefore, a strong authentication protocol becomes mandatory for distributed computation prior the client gets benefit of the network facilities. So first it provides a straightforward application usage. Secondly, the applications are not in isolation. Third, there is not a monolithic system. Fourthly, the application programs are not complicated and finally, the supporting technology is not based on a centralized control model.

Perspectives

1.1 Voice-over Internet Protocol (VoIP) In past few years, the popularity of VoIP facilities has increased because numerous Web and VoIP applications depend on huge and extremely distributed infrastructures to process requests from millions of users in an appropriate manner. Due to their excessive requests, these large-scale internet applications frequently compromise security for other purposes such as performance, scalability and availability [3]. As a result these applications characteristically prefer weaker but well-organized security mechanisms in their foundations. Voice-over-IP (VoIP) method has spread in the markets due to low cost and more flexible implementation as compared to Public Switched Telephone Network (PSTN). 1.2 Session Initiation Protocol (SIP) In last few years, many well-organized, extensible and riskless signalized schemes have been suggested to improve the applications usefulness and fast progression of Voice-over-IP. Among these signalized protocols, the Session Initiation Protocol (SIP) is commonly used because of its flexibility and significantly accessible designs and lightweight features. Session Initiation Protocol (SIP) is a presentation and application layers protocol which initiates, modifies and terminates IP-based multimedia intervals. Implementing SIP for secure communications has been a subject of study for the past few years and several proposals are available in the research domain. However, security aspects are not addressed in most of these proposals because SIP is exposed to several threats and faces security issues at these layers like registration hijacking, impersonating a server, message tampering, session tear down, Denial of Service (DoS) and session-key agreement protocol. However designing a good authentic key-agreement scheme for Session Initiation Protocol (SIP) is still a challenging task from the performance and security perspectives. Both the performance and security features are the critical factors stimulating SIP applications and these are also always appear contradictory. The authentication scheme can secure against different attacks and transport many characteristics to achieve the security needs of IP “Internet Protocol” based communications. Alternatively, the algorithm inserted in authentication portion of IP must not contain complex or heavy computations in clients and SIP servers because VoIP network communications are more delicate to transmission latency [9]. 1.3 Smart Card In recent years, the smart-cards have acquired an increasing acceptance as an authoritative contrivance for security, authenticity, authorization, identification and validation. The term smart-card generally alludes to a flexible card having memory-chip, a microchip and a complex instruction cycle processing mechanism which is not only capable of storing data but also does process, compute, manage and perform high cryptographic algorithmic operations. Moreover, smart cards associated communications typically engage five entities namely company, software installer, card issuer, card-holder/data-owner and terminal. Typically, the uses of smart-card are health-care, employee ID, calling cards, ATM cards, government Identification (ID) Cards, SIM cards for telecommunication, transportation services control cards, electronic passports for immigration and foreign travel, voting system in advanced countries, campus cards, satellite TV cards and information security [9-11]. 1.4 Biometrics Biometrics is a term used for body measurements and a calculation which also refers to metrics those are relevant to human characteristics. In computer science, biometrics is used as a form for identification, authorization and observations. The benefits of biometric verification are presented to basic cryptographic key supervisory systems for the purpose to enhance security and performance [12-13]. The paper is organizes such as: the part-2 gives some popular existing authentication schemes, part-3 gives detail about the proposed solution and part-4 gives the detail about the research methodology such as the robustness and security analysis of the authentication protocol by using BAN logic and an automated software toolkit ProVerif0.92. Finally, the performance of the scheme is compared with some recent popular authentication schemes, their computation cost, their communication cost and storage overhead.

Mr Saeed Ullah Jan
University of Malakand

Read the Original

This page is a summary of: An Improved Lightweight Privacy-Preserving Authentication Scheme for SIP-Based-VoIP Using Smart Card, SSRN Electronic Journal, January 2017, Elsevier,
DOI: 10.2139/ssrn.3345110.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page