Limits...
Biometrics based authentication scheme for session initiation protocol.

Xie Q, Tang Z - Springerplus (2016)

Bottom Line: Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks.In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication.Furthermore, our protocol is highly efficient when compared to other related protocols.

View Article: PubMed Central - PubMed

Affiliation: Key Laboratory of Cryptography and Network Security, Hangzhou Normal University, Hangzhou, 311121 China.

ABSTRACT
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

No MeSH data available.


Verification result of the protocol
© Copyright Policy - OpenAccess
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4940359&req=5

Fig1: Verification result of the protocol

Mentions: The above code is performed in the latest version 1.90 of ProVerif to show that the correspondence query is true and the two attacker queries are not true. That is, the authentication property and security are satisfied, referring to the Fig. 1.Fig. 1


Biometrics based authentication scheme for session initiation protocol.

Xie Q, Tang Z - Springerplus (2016)

Verification result of the protocol
© Copyright Policy - OpenAccess
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4940359&req=5

Fig1: Verification result of the protocol
Mentions: The above code is performed in the latest version 1.90 of ProVerif to show that the correspondence query is true and the two attacker queries are not true. That is, the authentication property and security are satisfied, referring to the Fig. 1.Fig. 1

Bottom Line: Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks.In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication.Furthermore, our protocol is highly efficient when compared to other related protocols.

View Article: PubMed Central - PubMed

Affiliation: Key Laboratory of Cryptography and Network Security, Hangzhou Normal University, Hangzhou, 311121 China.

ABSTRACT
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

No MeSH data available.