Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol
Autor: | Shaohui Zhu, Shanyu Tang, Liping Zhang |
---|---|
Rok vydání: | 2016 |
Předmět: |
Password
Authentication Session Initiation Protocol Voice over IP Biometrics Computer Networks and Communications Computer science business.industry computer.internet_protocol 020206 networking & telecommunications 02 engineering and technology Information security Computer security computer.software_genre Symmetric-key algorithm 0202 electrical engineering electronic engineering information engineering Key (cryptography) 020201 artificial intelligence & image processing Smart card Electrical and Electronic Engineering business computer Information Systems Computer network |
Zdroj: | Wireless Networks. 23:1901-1916 |
ISSN: | 1572-8196 1022-0038 |
DOI: | 10.1007/s11276-016-1267-2 |
Popis: | A secure key agreement scheme plays a major role in protecting communications between the users using voice over internet protocol over a public network like the internet. In this paper we present a strong security authenticated key agreement scheme for session initiation protocol (SIP) by using biometrics, passwords and smart cards. The proposed scheme realizes biometric data protection through key agreement process meanwhile achieving the verification of the biometric value on the SIP server side which is very important in designing a practical authenticated key agreement for SIP. The main merits of our proposed scheme are: (1) the SIP server does not need to maintain any password or verification table; (2) the scheme can provide user identity protection--the user's real identity is protected by a secure symmetric encryption algorithm and the elliptic curve discrete logarithm problem, and it is transmitted in code; (3) the scheme can preserve the privacy of the user's biometric data while the biometric matching algorithm is performed at the SIP server side, even if the server does not know the biometric data in the authentication process. Performance and security analysis shows that our proposed scheme increases efficiency significantly in comparison with other related schemes. |
Databáze: | OpenAIRE |
Externí odkaz: |