Abstract
One of the most frequently used signaling techniques for initiating, sustaining, and dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are gaining widespread applications in the human-centered Internet of Things (HC-IoT) domain. In HC-IoT environments, sensitive user data are transmitted over open communication channels that require secure authentication to protect sensitive user information from unlawful exploitation. In order to provide robust authentication for critical user data, SIP-based authentication mechanisms have been proposed; however, these authentication schemes have not provided perfect authentication and effective security for users. Additionally, the existing schemes are computationally intensive and cost-prohibitive in design and implementation. In order to address this problem, especially in the human-centered IoT context, this work introduces a provably secure, lightweight, three-factor SIP-based scheme to tackle the shortcomings of traditional schemes. The presented scheme is based on an extended fractional Chebyshev chaotic map. A formal security verification of the session key in the real-or-random (ROR) model is conducted to evaluate the projected scheme. The investigation results indicate that the new scheme is SIP compatible and achieves secure mutual authentication with robust security features compared to the existing schemes. Therefore, the proposed SIP-enabled scheme can be deployed in the human-centered Internet of Things to secure critical user information.
Keywords:
session initiation protocol; fractional Chebyshev chaotic map; secure key agreement; smart card; human-centered IoT environment; biometrics-assisted lightweight security systems MSC:
34C28
1. Introduction
In recent years, the session initiation protocol (SIP) has become the most widely used application layer control protocol [1,2,3]. Specifically, a SIP creates, modifies, and terminates sessions [4]. A SIP supports five key aspects required for establishing and maintaining the termination of a multimedia session; the five aspects are user location, user ability, user effectiveness, session management, and session initiation. Additionally, a SIP can define how to manage a session to meet expected outcomes in real time [5]. This flexible feature makes it possible to use a SIP in numerous applications and services such as music, videos, and web meetings [6,7].
In the literature, SIP-based schemes have been broadly categorized as one-factor SIP authentication [6,8,9,10,11], two-factor SIP authentication [2,12,13,14,15], and three-factor SIP authentication [16,17,18,19,20] schemes. One-factor SIP authentication schemes pose limited security against adversarial attacks since they only using passwords to prove user authenticity. The vulnerabilities identified include, but are not limited to, dictionary attacks, guessing attacks, and Trojan attacks [3]. Additionally, two-factor SIP authentication schemes use passwords and smart cards, making them safer. However, several drawbacks have been associated with two-factor SIP authentication schemes [21,22]; it is not unlikely that they are vulnerable to smart card loss attacks [12]. Three-factor SIP authentication schemes combine passwords, smart cards, and biometrics, which reinforces the security architecture of the schemes, making them suitable for applications in human-centered IoT environments [23,24,25]. These schemes have been used in medical decision support systems, smart homes, learning systems, and more [26,27]. Figure 1 depicts the network configuration and application scenarios for the session initiation protocol (SIP).
Figure 1.
Network configuration and application scenarios for the session initiation protocol.
Whereas the services provided by a SIP are beneficial, the associated security challenges are enormous and require critical examination. Several SIP-based authentication schemes have been reported [14,22,28,29,30]. In addition, a few SIP-based key agreement schemes pose high resistance to sophisticated attacks [31]. However, most SIP-based authentication schemes are vulnerable to well-known threats. Thus, the need for robust security and a key agreement protocol for a SIP scheme that is not susceptible to any known attack is imperative, which is the basis for the current study.
1.1. Research Contributions
This article proposes a provably secure, lightweight, three-factor session initiation protocol using extended fractional Chebyshev chaotic maps (FCCM) in the HC-IoT environment. In particular, the key contributions of this paper are highlighted as follows.
- ▪
- An efficient and secure remote authentication scheme for a SIP is proposed using extended FCCM, a smart card (SC), and user biometrics simultaneously in the HC-IoT environment.
- ▪
- An informal security analysis of the projected protocol is demonstrated, and the results show that it is provably secure in the ROR model.
- ▪
- A comparison of the projected protocol with related authentication protocols is conducted and it is found that it is cost-efficient and requires fewer computational resources. This is because the presented approach uses FCCM, which eliminates computationally intensive elliptic curve point multiplication.
1.2. Organization of Manuscript
The remainder of this work is organized as follows: In Section 2, we outline related works; in Section 3, we provide the background and material; In Section 4, we present our new SIP scheme based on FCCM; in Section 5, we provide a comprehensive security analysis of the projected technique; in Section 6, we demonstrate the performance evaluation of the projected technique; finally, in Section 7, we provide a concise conclusion to the paper.
2. Related Work
In wireless communication, especially in the human-centered IoT environment, guaranteeing a secure SIP for the communication requires secure authentication with a key agreement protocol executed before actual communication is initiated. In order to fulfill this criterion, several SIP-based schemes have been proposed [6,12,13,32,33]. Specifically, Arshad and Nikooghadam presented an effective authentication scheme for a SIP based on elliptic curve cryptography (ECC). In addition, Zhang et al. [12] reported a flexible authentication scheme for a SIP, leveraging smart cards. Interestingly, the scheme by Zhang et al. [12] showed impressive security features; however, the security of the scheme was not perfect, as claimed. In the work by Irshad et al. [13], the flaws in Zhang et al.’s scheme were highlighted, and solutions were offered to improve the scheme. In particular, one of the main limitations of Zhang et al.’s scheme was its vulnerability to a DoS attack. As a result, Irshad et al. [13] presented an improved SIP based on chaotic constructions. In another related study that examined the limitations of Irshad et al.’s protocol [13], Arshad et al. [6] mentioned that the protocol was vulnerable to client impersonation attacks. In order to address the limitations posed by Irshad et al.’s protocol, Arshad et al. projected a secure protocol that employed elliptic curve cryptography (ECC) [6]. In a recent analysis, Lin et al. [32] showed that the protocol, due to Arshad et al., was not secure against several attacks such as server spoofing, denial-of-service (DoS), and privilege insider attacks. Lin et al. [32] also demonstrated that Arshad et al.’s protocol failed the user anonymity test. In order to strengthen the security of Arshad et al.’s protocol [6], Lin et al. suggested a new scheme for a SIP using the ECC.
In [34], Chen et al. examined the security of the protocol presented by Lin et al. [32]. The SIP for anonymous authentication and key negotiation was shown to have various security issues. The protocol failed an offline password-guessing attack and could not sustain a stolen memory device attack. Furthermore, Lin et al.’s protocol could not verify a wrong password and showed a weak password updating procedure. In order to address the proliferating issues in Lin et al.’s protocol, Chen et al. [34] presented a new mutual authentication with a key agreement protocol with robust features compared to Lin et al.’s protocol. An authentication scheme for a SIP was presented by Islam et al. [35]. The authors claimed that the SIP-based scheme was immune to known attacks. However, the work conducted by Chen et al. [34] revealed that Islam et al.’s protocol [35] failed impersonation attacks and could not achieve user anonymity.
Chen et al.’s scheme [34] used an extended chaotic map that supported fast computation. Additionally, the scheme was tested using Burrows–Abadi–Needham (BAN) logic to demonstrate that it supported secure mutual authentication. The ROR model was also used to examine the formal security investigation of the session key. The most critical part of a SIP is the authentication process required for a network user to access the SIP server. SIP security is becoming increasingly significant, and the need for a reliable authentication scheme for the SIP is not out of place.
However, the security of a SIP-based authentication protocol has been questioned, primarily as billions of sensitive user data are currently being conveyed in real time over open communication channels. In order to boost the security frameworks of these schemes, Zhang et al. [36] employed biometric identification technology to project a lightweight SIP authentication leveraging symmetric encryption. Zhang et al.’s scheme [36] showed good resilience to insider attacks, offline dictionary attacks, replay attacks, and it had lower computational costs. It should be emphasized that Zhang et al.’s scheme was not perfect. Recently, Naqvi et al. [16] revealed some security vulnerabilities in Zhang et al.’s scheme, such as limited resistance to replay attacks and failure to meet user anonymity requirements.
Naqvi et al. suggested a three-factor SIP-based protocol to address the vast limitations of Zhang et al.’s protocol. Furthermore, Mishra et al. [17] analyzed the protocol reported in [37] and showed that it was vulnerable to man-in-the-middle and impersonation attacks. A SIP protocol based on biometrics offering robust security against active and passive attacks has been demonstrated by Mishra et al. [17] to address the limitations of the scheme by Tu et al. [37]. Additionally, Mishra et al. [17] used the Automated Validation of Internet Security Protocols and Application (AVISPA) tool to investigate the formal security of the projected protocol. However, Islam et al. [20] observed that the SIP-based protocols reported by [16,17,36] were vulnerable to DoS attacks and lacked resiliency against clock synchronization issues. In order to improve the performance of this protocol, Islam et al. [20] suggested a robust and cost-effective scheme using hash functions and hard computational problems.
However, several vulnerabilities, such as limited resistance to impersonation attacks, forgery attacks, user anonymity issues, and lack of forward secrecy, limit the protocol’s authenticity. In order to improve user anonymity and other problems identified in Islam et al.’s procedure [20], Wang et al. [38] put forward a public key scheme that provided robust security and supported user anonymity. Due to design deficiencies, most SIP-based protocols [27,39,40] have shown some security vulnerabilities. In addition, the application of scalar multiplication in SIP-based protocols has contributed to high computation overhead. Nevertheless, Chebyshev chaotic maps find useful applications in human-centered IoT environments in facilitating identity verification in healthcare information systems [41], cloud computing [42], and the Internet of Things (IoT) [43].
Another work closely related to the current study is the scheme reported in [3]. Specifically, the scheme is based on an extended chaotic map, which avoids computationally expensive elliptic curve point multiplication. In addition, the study aimed to enhance mutual authentication to eliminate the drawbacks of the exisitng schemes. The study applied Burrows–Abadi–Needham logic to prove that the proposed scheme achieved secure mutual authentication and was suitable for SIP applications. However, the work in [3] failed the clock synchronization attack, which is critical to protecting sensitive user information. In order to address this problem, there is a need for a more robust and enhanced security scheme for SIP applications. To this end, the current work proposes using fractional Chebyshev chaotic maps to address the prevailing issues in the existing SIP-based protocols. The proposed scheme successfully resolved the clock synchronization problem in the scheme reported in [3].
The preliminaries and background of fractional Chebyshev chaotic maps employed in designing our SIP-based protocol are briefed in this paper.
3. Background and Material
In this section, we briefly discuss the functionality and security requirements, the hash function [44], the Chebyshev chaotic map [45], the FCCM [46], and the biometrics and fuzzy extractor [47] which are described in this article. Table 1 lists the notations used for the protocol developed in this paper.
Table 1.
The notations used in the development of the protocol.
3.1. Hash Function
A hash function of the form accepts any binary length string as input and gives a binary string as yield. The following is the collision-resistance of :
Definition 1.
Assume that
reflects an adversary
𝒜’s advantage in locating a hash collision in polynomial time
, i.e.,
, where
denotes the probability of an
event occurring. When a
-adversary
𝒜 attacks the resistance of
, this indicates that
𝒜’s runtime is, at most,
and that
is true for an adequately small
.
3.2. Chebyshev Chaotic Maps
Let ʑ be a real number and n be an integer, the Chebyshev polynomial is then defined as follows:
The Chebyshev polynomial has the following recurrence relation:
- Chaotic map-based discrete logarithm problem (CMDLP): For any given x and y, it is not computationally feasible to calculate the integer n such that
- Chaotic map-based computational Diffie–Hellman problem (CMDHP): It is not computationally feasible to compute , for three elements and .
Where there is a large prime number, the Chebyshev polynomial with CMDHP has the following formal definition:
Definition 2.
For any
adversary with
execution time, the advantage probability
of the CMDHP is negligible, that is,
for a sufficiently small
.
3.3. Fractal Chaotic Maps (FCM)
Fractal calculus (FC) was formerly known as a local fractional calculus [45,48]. In addition, fractional calculus accepts holdings. The following preparation takes priority over FC:
Suppose that the fractional difference operator is defined by the formal equation for a random fractional-order [0, 1]. Then,
and the fractal integral operator is the same as this:
By using the formula in (1), it can be approximated as:
By generalizing the polynomial with the FC notion, we obtain the following Equation (2):
The fractal Chebyshev polynomial is abbreviated as FCP (see Figure 2).
Figure 2.
3D-FCP when = 0, 1/2, and 3/4.
3.4. Possessions of Fractal Chaotic Maps with Extension
The following are two of the FCP’s critical properties:
Definition 3
(Chaotic possessions of FCM).The fractal chaotic maps [45,49] satisfy the chaotic possessions recurrent relations, i.e., . The usual significant effect, as observed by Yang et al. [48], is well known when is used.
Definition 4
(Semi-group possessions of FCM).For FCMs on the interval (-∞, ∞) (it is known as extended FCCM) [45], the semi-group possessions hold.
3.5. Biometrics and Fuzzy Extractor
Because of their distinct qualities, biometric keys such as palm prints, fingerprints, and iris are being used in numerous authentication procedures. There are three significant advantages to using biometric keys: They are incredibly tough to fabricate or distribute, as well as duplicate or share, and they cannot be misplaced or forgotten.
The fuzzy extractor approach has recently been discovered to be effective in extracting the biometric key from the biometric input from users. The fuzzy extractor takes a user’s biometric feature input, say , and generates the unique random string, , as well as the auxiliary string, , in an error-tolerant manner using a probabilistic generation function. Furthermore, it uses a deterministic replication technique to construct the identical original string , an auxiliary string , and a noisy user biometric that differs from the original biometric up to a threshold value.
Two algorithms, and , are used in the fuzzy extraction method. and are the definitions for the functions and .
4. The Proposed Three-Factor SIP Scheme Based on FCCM under the HCIoT Environment
An efficient and secure SIP is projected in this segment. The proposed SIP is divided into five major stages: (1) setup, (2) registration, (3) login, (4) authentication and key formation, and (5) password and biometrics change. The specifics are listed as follows:
4.1. Setup Stage
During this stage, the produces all systems’ public constraints.
- Step 1.
- The picks as its secret key.
- Step 2.
- and a secure hash function are computed by the using a random number and rational number
- Step 3.
- The makes the constraints available to all legal users.
4.2. Registration Stage
During this stage of the protocol, the and the use a secure channel to complete the following tasks in order to publish a valid . It is worth noting that this is a one-time procedure.
- Step 1.
- The scans her/his biometrics using a biometric scanner gadget. The picks an , as well as a password . Then, he/she computes and , and sends , through a secure channel to the .
- Step 2.
- When the registration message is received, the usages its private key s and to calculate , , and . Then, the stores into a and transmits it to the over a protected channel.
- Step 3.
- When the receives the , he/she writes on it.
Finally, the contains the following info: .
4.3. Login Stage
The and their carry out the following steps:
- Step 1.
- The enters his/her and into the terminal contraption before allowing a scan to obtain his/her biometrics . In addition, the must use the terminal card reader to input his/her .
- Step 2.
- The calculates , , , and . If , the exits this stage, and the ’s login request is rejected. Otherwise, the next phase is carried out by both the and the .
4.4. Authentication and Key Formation Stage
After a registered user successfully signs in, the authentication of a remote server is confirmed. The session key is recognized among the and the after the successful mutual authentication. The specific steps are outlined as follows:
- Step 1.
- The ’s picks an arbitrary number and computes and . The uses a public channel to send a request message to the .
- Step 2.
- The computes , , and after receiving the request message . If is equal to the computed value . If the verification fails, the immediately rejects this stage. Otherwise, the selects an arbitrary number and computes , and . Over a public channel, the sends to the .
- Step 3.
- When the receives , it computes and . The validates the correctness of by comparing to . If , the aborts the session; otherwise, it calculates and transmits the answer message to the through a public channel. Then, calculates the .
- Step 4.
- When the gets from the ’s smart card, it computes and compares to the calculated value. If , the calculates the . Figure 3 depicts the registration, login, authentication, and key establishment processes.
Figure 3. The registration, login, authentication, and key formation stages of the projected protocol.
4.5. Password and Biometrics Change Stage
The can update her/his existing and without involving the during this step, as indicated below:
- Step 1.
- The inserts the into the card reader and enters the credentials and . Then, the uses a biometric scanner gadget to scan her/his biometrics .
- Step 2.
- The smart card calculates , and . Then, the smart card checks to see if the calculated is similar to . If the conditions are met, the can change the existing and . Otherwise, the request can be denied.
- Step 3.
- The updates the smart card with a new password and biometrics . Then, the smart card computes , as well as , , and . The smart card replaces the tuple with the new tuple .
5. Security Examination of the Proposed Protocol
We examine the introduced protocol from the standpoint of security analysis in this section, employing all available analyses. The session key’s formal security is demonstrated using the widely established ROR model [50], and other known attacks are evaluated using informal (non-mathematical) security analysis.
5.1. The ROR Model for Session Key Security
In order to investigate the security of a session key, the ROR model [50] is extensively used in authentication based on key agreement techniques [51,52,53,54,55,56,57]. In order to prove the security of the session key, the introduced protocol also employs the ROR model.
Bellare et al. [58] introduced the security mechanism for the password-based authenticated key exchange procedure. By introducing a few new oracles to Abdalla et al.’s ROR model [50], we made it a three-factor model. The following are the definitions of the terms:
- Participants
Let stand for the proposed scheme. polynomial times can be executed by both a genuine user and a . The symbols and denote the place of the and the , respectively.
- b.
- Partnering
In practice, each key agreement conversation has its session identification (sid). If and have the same non-null session identifiers, we call them partnered.
- c.
- Adversary
The widely established Dolev–Yao (DY) threat model [59] is used to model an adversary in the ROR model. can interrupt, remove, modify, or even insert some or all messages transmitted among the and communication participants using the following queries, according to the DY model:
Execute: This inquiry simulates an eavesdropping attack and returns to its partner a copy of the messages sent by .
Send: This inquiry executes an active attack. can transmit this inquiry to a participant instance via message . Then, they will respond to the with an analogous reply message.
Corrupt: It represents the loss of info. There are three available cases:
- : is obtained by via the query.
- : The query allows to obtain data from ’s Smart card.
- : Through the query, obtains ’s biometrics .
This inquiry is depicted as an active attack in which can extract all of the sensitive secret info contained in its memory by using power analysis attacks.
Test : In the test inquiry, the session key’s semantic security is emulated. In order to respond to the inquiry, the test oracle invokes execute and flips a fair arbitrary coin {0,}. If , the test oracle sends to the adversary the yield of execute and the session key . If , the test oracle sends to the adversary the yield of execute and an arbitrary binary string. The random binary string must be a similar length as the session key in this scenario. If adversary asks many test questions, all of the answers should depend on the same value.
Hash : When a query is issued to the hash oracle, it examines its table for and proceeds if exists; otherwise, it proceeds to a uniformly arbitrary string and stores , in the table.
- d.
- Semantic Security
If the above-noted inquiries are provided, the may communicate with the situations to assist him/her in determining the value of bit . If they guess properly, the strategy does not give semantic security. Let be ’s guessed bit. Then, a polynomial-time the ’s advantage in breaching the proposed scheme’s session key security is defined as |, where indicates the probability of an event occurring.
5.2. The Proof of Security
Theorem 1.
where and represent the number of execute, send and hash queries, respectively. and represent the size of the homogeneously distributed password dictionary , the string length of the result of the Chebyshev polynomial, the string length of hash results, the probability of false positive, and the extracted string length of user biometrics, respectively. The advantage of in breaching the FCMDHP with the execution time is indicated by .
Let
be the advantage that a
adversary with execution time
violates the semantic security of our projected protocol
. Then,
Proof:
Our proof establishes a series of hybrid games, beginning with the actual attack and ending with a game in which
has no advantage.
is an occurrence in which
has a chance to win the game
. Below is a detailed portrayal of the games. □
Game : This game simulates an actual attack by . We have, according to the preliminary definitions given by Equation (3),
Game : The only difference between this game and the previous one is that replicates the hash oracle by keeping a list . If there is a record in for a hash query , the oracle proceeds to the . Otherwise, the oracle selects an arbitrary number , proceeds to the , and inserts the record to . This accomplishment of the corrupt, send, execute, and test inquiries are similar to the execution of the actual attack. Thus, we have Equation (4):
Game : We simulate all inquiries in this game in the same way that we did in , except that we halt all simulations when a collision ensues in the documents , and . The oracles may clash with distinct input values if and are the same locations in multiple documents. We stop the game if any of the above scenarios appear. The probability of collision in the oracle output is, at most, , according to the birthday paradox. In the documents simulation, the chance of collisions is limited to , because and were arbitrarily selected from a uniform distribution . As a result, (5):
Game : We abort the executions in this game if the adversary guesses the authentication values , and by chance (that is, without having to use the hash inquiry ). Except that the (or the ) discards a legal authentication assessment, there is no difference between and . Thus, we have Equation (6):
Game : The adversary’s situation is avoided in this game. predicts the authentication value directly and correctly. At most, the probability is . We arrive at Equation (7):
Game : In this game, we try to prevent adversary from using corrupt to compute the authentication value . According to the premise, oracle corrupt can only provide with two factors. If only has and , she/he will be unable to find the session key. As a result, corrupt is required for , and we assume has asked about it. The analysis that follows is split into two parts.
- Case 1:
- Assume sends a query to corrupt to guess the real password. The probability is because there are chances to send inquiries and passwords.
- Case 2:
- Assume inquiries corrupt to crack . There are two subcases to consider:
- (a)
- Within , guesses Send queries. is the probability.
- (b)
- tries the event of “false positive” with send inquiries using her/his biometrics. is the probability.
In this game, adversary can choose between Cases 1 and 2. The games and are indistinguishable without these guessing attacks, and therefore, we have Equation (8):
Game : In this game, instead of using the , we include and use the private ’ oracle to calculate the . The adversary is unaware of because he/she is a private oracle. is the value we have. Except that the makes a hash inquiry , the games and are indistinguishable. We call this event . Therefore, we have Equation (9):
Game : In this game, we simulate FCMDHP’s random self-reducibility. To build the session key , hash entries with two chaotic map variables and are utilized. This game executes without running the oracle or possessing the s or . As a result, the probability in this case is . As a result, we obtain Equation (10):
As a result, we manipulated Equations (3)–(10) to give the following inequality:
5.3. Informal Security Examination and Discussion
In this area, we address the security of the presented protocol informally (non-mathematically) in terms of existing known attacks and some of the proposed protocol’s core functionality characteristics.
5.3.1. User Anonymity
Due to privacy considerations, user anonymity becomes a major worry for authentication schemes. It stipulates that no one can reveal the user’s true identity without the remote server’s private key. Our technique ensures user anonymity because cannot find from any attacker login or authentication communication. In our design, the never conveys the to the over a public channel. Only and are sent by the , and is protected by the arbitrary number . As a result of , the is unable to extract it from . As a result, our proposed scheme protects user privacy.
5.3.2. User Untraceability
User untraceability specifies that no two messages from the same session will be identical. If it is, will have little trouble tracing the . We suppose that the catches two request messages, and , which are created by the in two sessions, where , and , , , . The messages and are different because of the random numbers and . As a result, will be unable to discover the relationship between and . As a result, our suggested approach provides high user anonymity.
5.3.3. Impersonation Attack
The attacker attempts to mimic either the or the , or both, in this attack. If achieves some sort of success, the system will not provide strong security. As a result, the cannot imitate any of the or the because the message , and cannot be fabricated by the . If intends to impersonate the user, she/he must first construct an arbitrary number in order to calculate a request message. and may be computed by the . With a legitimate request message, to impersonate the user, the must know the assessment of and , that is, the must know the and . Authentication will fail if this is not done. Similarly, the cannot deceive the user and the remote server by forging the messages , and . As a result, under our suggested approach, impersonating the and the is not possible.
5.3.4. Offline Password Guessing Attack
Assume you have a competitor. obtains all of the recorded information from the memory of a stolen or lost of a legitimate user employing power analysis attacks. To properly guess from , must be aware of ’s private key , as well as ’s biometrics and . In addition, knowledge of , and is required to accurately guess from . However, only can supply its , only the and involved in the authentication procedure are aware of the , and only is aware of its secret key . As a result, our technique is resistant to offline password-guessing attacks.
5.3.5. Known Key Secrecy
Even if a specific session key in the proposed technique is compromised, will not be able to discover the other session keys. , where is how our technique computes the session key. and are generated at random and only once for each new session. As a result, in order to calculate future session keys, an attacker cannot extract any personal info from an obtained session key.
5.3.6. Temporary Information Attack on Known Sessions
In the projected system, the and the estimate a mutual session key in each session as . The secrecy of is determined by the parameters and . The temporary secrets and are assumed to be known by . By using this information, on the one hand, the may compute . The , on the other hand, cannot compute without being aware of the ’s private key and the ’s identification . As a result, the cannot compute ; thus, our suggested strategy is resistant to this type of attack.
5.3.7. Privileged-Insider Attack
The selects an and a during the user registration process. Then, they compute and , and sends to the through a secure channel. Nevertheless, due to the one-way of , an insider client of the who is an adversary is unable to extract and from . As a result, our suggested solution resolves the problem caused by the privileged-insider attack.
5.3.8. Password and Biometrics Change Attack
The of an approved registered user first authenticates the user by computing , and, , and then validating the condition based on the user’s initiated identity , , and . The will allow you to alter your password and biometrics if this condition is met. As a result, updating the password and biometrics of without knowing the private integrity is a computationally infeasible assignment for . As a result, the presented protocol protects against password and biometrics change attacks.
5.3.9. Efficient Password and Biometrics Change
Through the password and biometrics change stage of the presented technique, a legitimately registered user inserts her/his identification, biometrics, and current password into her/his smart card to update the recent password and biometrics. The can update the password and biometrics if all of the secret integrity entered are correct. The password and biometrics are then updated locally in the smart card’s memory, bypassing the remote server . As a result, the stage of changing passwords and biometrics goes smoothly.
5.3.10. Three-Factor Confidentiality
Three-factor confidentiality means that even if one or both authentication parameters are exposed, the adversary will not impersonate the user successfully. In the following three cases, we demonstrate that our technique ensures three-factor confidentiality:
- If the user’s smart card and biometrics are revealed, the adversary attempts to crack the password. On the one hand, the parameters and are obtained by the , where and . The , on the other hand, is unable to reveal because , where is known only to the and is known only to the user.
- If the user’s smart card and password are revealed, on the one hand, the obtains the parameters , and , where and . The , on the other hand, is unable to deduce from and because it must simultaneously guess correct , and .
- The tries to crack the smart card’s specifications if the biometrics and password are disclosed. Because is unavailable, retrieving the critical factor is impossible.
5.3.11. Clock Synchronization Issue
Unlike many previous SIPs, the presented SIP might work even if the clock is out of sync, providing adequate communication between the recipient and the sender. Since the timestamp is merely relevant to the receiver’s clock, synchronized clocks are not necessary. He/she only verifies the timestamp generated by the recipient.
6. Performance Evaluation
In this segment, we compare the proposed protocol’s communication, computation, and smart card storage costs to those of other relevant SIPs, such as [3,6,13,18,19,35]. We state that the presented SIP involves two major stages: login/authentication and the key establishment, which must be completed each time the system is accessed. As a result, we simply look at the phases of login/ authentication and the key establishment in this segment. All of the comparisons are described in detail below.
6.1. Computation Cost Analysis
The notations used for comparison estimations are listed in Table 2. We signify certain notations and their implementation times on an Intel Pentium 4 2600 MHz processor with 1024 MB RAM, as conducted in [3], and given in Table 3. To estimate the effectiveness of the presented SIP and compare it to earlier SIPs, we ignore the bitwise XOR operation because it is insignificant.
Table 2.
Syntaxes for making comparative estimates.
Table 3.
The computation costs comparison.
According to [3], the execution time for , , , , , and for [45] are given by 0.5 ms, 8.7 ms, 63.08 ms, 21.02 ms, 63.08 ms, and 9.82 ms, respectively. We compare the computational cost of the presented protocol with the other associated SIPs [3,6,13,18,19,35]. Table 3 shows the comparison of computational cost results. These findings indicate that the presented protocol is more efficient than other SIP schemes.
6.2. Communication Cost and Smart Card Storage Assessment
In this subsection, we compare our proposed SIP to comparable SIPs in terms of smart card storage and communication costs. The SHA-1 hash function is used, and its output length is 160 bits. The identity/password/arbitrary number is 64 bits long. The output of the Chebyshev chaotic map (CCM) is 128 bits long. The function returns a tuple with 80 bits for each component. The smart card in our proposed SIP holds , and the storage cost is bits. As a result, our proposed SIP significantly reduces smart card storage capacity. In our login, authentication and key formation process, the first sends to the at a cost of bits. Then, the sends to the at a cost of bits. Lastly, the transmits to the at a cost of bits. As a result, the overall cost of communication is bits. We also compute the costs of communication and smart card storage [3,6,13,18,19,35], as shown in Figure 4.
Figure 4.
A comparison of the costs of communication and smart card storage.
6.3. Analysis of Security and Functionality
Table 4 provides a full comparison of various security attacks and functionality aspects. As shown in Table 4, our suggested SIP solves the security and functionality flaws prevalent in existing SIPs. Among the contenders, the work in [3] appears to show related results to the results of the current study. However, the work in [3] failed the clock synchronization attack, whereas our presented scheme successfully resolved the clock synchronization problem. Regarding running costs, our scheme also shows favorable costs compared to the scheme reported in [3], as shown in Table 4.
Table 4.
Comparison of security and functionality attributes.
7. Conclusions
In this paper, we proposed a lightweight, provably, protected three-factor session initiation protocol in human-centered IoT. We used the ROR model for formal security analysis, and the results indicated that our proposed SIP provides session key security. Additionally, we performed an informal security analysis to demonstrate that our proposed SIP could withstand various existing attacks. Based on the FCCM-CDH problem’s hardness assumption, the proposed SIP is provably secure. Lastly, through a rigorous performance assessment, we showed that it significantly decreased total computing time, smart card storage, and communication costs compared to other associated protocols. Future studies will analyze the presented protocol in a simulated and real-world context to further investigate the performance characteristics. In addition, the projected technique would be tested using Bergamo’s and other security attacks to demonstrate its efficacy.
Author Contributions
C.M. and C.-C.L. were responsible for the conceptualization of the topic; article gathering and sorting were carried out by C.M., C.-C.L. and A.L.I.; manuscript writing and original drafting and formal analysis were carried out by C.M., C.-C.L., I.B. and A.L.I.; writing of reviews and editing were carried out by C.M., C.-C.L., I.B. and A.L.I.; C.M. led the overall research activity. All authors have read and agreed to the published version of the manuscript.
Funding
The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund (PTDF), the German Academic Exchange Service (DAAD), through the Nigerian-German Postgraduate Program under grant 57473408. This work was supported, in part, by the Ministry of Science and Technology (MOST), Taiwan, R.O.C., under contract no. MOST 110-2410-H-030-032.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The data that support the findings of this paper are available from the corresponding author upon reasonable request.
Acknowledgments
The authors would like to thank anonymous reviewers of the Mathematics MDPI Journal for their careful and helpful comments.
Conflicts of Interest
The authors declare no conflict of interest related to this work.
References
- Yeh, H.-L.; Chen, T.-H.; Shih, W.-K. Robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Comput. Stand. Interfaces 2014, 36, 397–402. [Google Scholar] [CrossRef]
- He, D.; Chen, J.; Chen, Y. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Netw. 2012, 5, 1423–1429. [Google Scholar] [CrossRef]
- Guo, X.Y.; Sun, D.Z.; Yang, Y. An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map. IEEE Access 2020, 8, 111265–111277. [Google Scholar] [CrossRef]
- Yoon, E.-J.; Shin, Y.-N.; Jeon, I.-S.; Yoo, K.-Y. Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech. Rev. 2010, 27, 203–213. [Google Scholar] [CrossRef]
- Kilinc, H.H.; Yanik, T. A survey of SIP authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 2013, 16, 1005–1023. [Google Scholar] [CrossRef]
- Arshad, H.; Nikooghadam, M. An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimed. Tools Appl. 2016, 75, 181–197. [Google Scholar] [CrossRef]
- Febro, A.; Xiao, H.; Spring, J.; Christianson, B. Edge security for SIP-enabled IoT devices with P4. Comput. Netw. 2022, 203, 108698. [Google Scholar] [CrossRef]
- Xie, Q.; Tang, Z. Biometrics based authentication scheme for session initiation protocol. Springerplus 2016, 5, 1–14. [Google Scholar] [CrossRef]
- Arshad, R.; Ikram, N. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed. Tools Appl. 2013, 66, 165–178. [Google Scholar] [CrossRef]
- Tang, H.; Liu, X. Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol. Multimed. Tools Appl. 2013, 65, 321–333. [Google Scholar] [CrossRef]
- Irshad, A.; Sher, M.; Faisal, M.S.; Ghani, A.; Ul Hassan, M.; Ashraf, C.S. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commun. Netw. 2014, 7, 1210–1218. [Google Scholar] [CrossRef]
- Zhang, L.; Tang, S.; Cai, Z. Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. Int. J. Commun. Syst. 2014, 27, 2691–2702. [Google Scholar] [CrossRef]
- Irshad, A.; Sher, M.; Rehman, E.; Ch, S.A.; Hassan, M.U.; Ghani, A. A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimed. Tools Appl. 2015, 74, 3967–3984. [Google Scholar] [CrossRef]
- Kumari, S.; Chaudhry, S.A.; Wu, F.; Li, X.; Farash, M.S.; Khan, M.K. An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 2017, 10, 92–105. [Google Scholar] [CrossRef]
- Farash, M.S. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Netw. Appl. 2016, 9, 82–91. [Google Scholar] [CrossRef]
- Naqvi, H.; Chaudhry, S.A.; Mahmood, K. An improved authentication protocol for SIP-based VoIP. In Proceedings of the International Conference on Recent Advances in Computer Systems (RACS 2015), Hail, Saudi Arabia, 30 November–1 December 2015; pp. 7–12. [Google Scholar]
- Mishra, D.; Das, A.K.; Mukhopadhyay, S. A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Netw. Appl. 2016, 9, 171–192. [Google Scholar] [CrossRef]
- Farash, M.S. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int. J. Commun. Syst. 2017, 30, e2879. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Naqvi, H.; Sher, M.; Farash, M.S.; Hassan, M.U. An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Netw. Appl. 2017, 10, 1–15. [Google Scholar] [CrossRef]
- Islam, S.K.H.; Rajeev, V.; Amin, R. A robust and efficient three-factor authentication and session key agreement mechanism for SIP. In Proceedings of the 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), IEEE, Tindivanam, India, 3–4 February 2017; pp. 286–291. [Google Scholar]
- Reddy, A.G.; Yoon, E.-J.; Das, A.K.; Yoo, K.-Y. An enhanced anonymous two-factor mutual authentication with key-agreement scheme for session initiation protocol. In Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, 20–22 July 2016; pp. 145–149. [Google Scholar]
- Lu, Y.; Li, L.; Peng, H.; Yang, Y. An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multimed. Tools Appl. 2017, 76, 1801–1815. [Google Scholar] [CrossRef]
- Meshram, C.; Imoize, A.L.; Aljaedi, A.; Alharbi, A.R.; Jamal, S.S.; Barve, S.K. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments. Sensors 2021, 21, 7227. [Google Scholar] [CrossRef]
- Meshram, C.; Obaidat, M.S.; Tembhurne, J.V.; Shende, S.W.; Kalare, K.W.; Meshram, S.G. A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems. IEEE Syst. J. 2020, 15, 5507–5515. [Google Scholar] [CrossRef]
- Meshram, C.; Imoize, A.L.; Jamal, S.S.; Alharbi, A.R.; Meshram, S.G.; Hussain, I. CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps. IEEE Access 2022, 10, 39853–39863. [Google Scholar] [CrossRef]
- Dharminder, D.; Kumar, U.; Gupta, P. A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services. Complex Intell. Syst. 2021, 7, 2531–2542. [Google Scholar] [CrossRef]
- Dhillon, P.K.; Kalra, S. Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things. Multimed. Tools Appl. 2019, 78, 22199–22222. [Google Scholar] [CrossRef]
- Farash, M.S.; Kumari, S.; Bakhtiari, M. Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimed. Tools Appl. 2016, 75, 4485–4504. [Google Scholar] [CrossRef]
- Azrour, M.; Ouanan, M.; Farhaoui, Y. A new secure SIP authentication scheme based on elliptic curve cryptography. In Proceedings of the International Conference on Information Technology and Communication Systems, Churibka, Morocco, 28–29 March 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 155–170. [Google Scholar]
- Sureshkumar, V.; Amin, R.; Anitha, R. A robust mutual authentication scheme for session initiation protocol with key establishment. Peer-to-Peer Netw. Appl. 2018, 11, 900–916. [Google Scholar] [CrossRef]
- Nikooghadam, M.; Amintoosi, H. A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol. Secur. Priv. 2020, 3, e92. [Google Scholar] [CrossRef]
- Lin, H.; Wen, F.; Du, C. An anonymous and secure authentication and key agreement scheme for session initiation protocol. Multimed. Tools Appl. 2017, 76, 2315–2329. [Google Scholar] [CrossRef]
- Wu, L.; Zhang, Y.; Wang, F. A new provably secure authentication and key agreement protocol for SIP using ECC. Comput. Stand. Interfaces 2009, 31, 286–291. [Google Scholar] [CrossRef]
- Chen, C.-M.; Xiang, B.; Wang, K.-H.; Yeh, K.-H.; Wu, T.-Y. A robust mutual authentication with a key agreement scheme for session initiation protocol. Appl. Sci. 2018, 8, 1789. [Google Scholar] [CrossRef]
- Islam, S.K.H.; Vijayakumar, P.; Bhuiyan, M.Z.A.; Amin, R.; Balusamy, B. A provably secure three-factor session initiation protocol for multimedia big data communications. IEEE Internet Things J. 2017, 5, 3408–3418. [Google Scholar] [CrossRef]
- Zhang, L.; Tang, S.; Zhu, S. A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. Peer-to-Peer Netw. Appl. 2016, 9, 108–126. [Google Scholar] [CrossRef]
- Tu, H.; Kumar, N.; Chilamkurti, N.; Rho, S. An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Netw. Appl. 2015, 8, 903–910. [Google Scholar] [CrossRef]
- Wang, D.; He, D.; Wang, P.; Chu, C.-H. Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Trans. Dependable Secur. Comput. 2014, 12, 428–442. [Google Scholar] [CrossRef]
- Maitra, T.; Giri, D.; Mohapatra, R.N. SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol. Cryptologia 2019, 43, 212–232. [Google Scholar] [CrossRef]
- Hassan, M.U.; Chaudhry, S.A.; Irshad, A. An Improved SIP Authenticated Key Agreement Based on Dongqing et al. Wirel. Pers. Commun. 2020, 110, 2087–2107. [Google Scholar] [CrossRef]
- Meshram, C.; Ibrahim, R.W.; Obaidat, M.S.; Sadoun, B.; Meshram, S.G.; Tembhurne, J. V An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Comput. 2021, 25, 8905–8920. [Google Scholar] [CrossRef]
- Tiwari, D.; Gangadharan, G.R. SecAuth-SaaS: A hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing. J. Ambient Intell. Humaniz. Comput. 2021, 12, 10539–10563. [Google Scholar] [CrossRef]
- Mandal, S.; Bera, B.; Sutrala, A.K.; Das, A.K.; Choo, K.K.R.; Park, Y.H. Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Internet Things J. 2020, 7, 3184–3197. [Google Scholar] [CrossRef]
- Gaikwad, V.P.; Tembhurne, J.V.; Meshram, C.; Lee, C.-C. Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J. Supercomput. 2021, 77, 8281–8304. [Google Scholar] [CrossRef]
- Meshram, C.; Imoize, A.L.; Aljaedi, A.; Alharbi, A.R.; Jamal, S.S.; Barve, S.K. An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps. Sensors 2021, 21, 7039. [Google Scholar] [CrossRef] [PubMed]
- Meshram, C.; Ibrahim, R.W.; Obaid, A.J.; Meshram, S.G.; Meshram, A.; Abd El-Latif, A.M. Fractional chaotic maps based short signature scheme under human-centered IoT environments. J. Adv. Res. 2021, 32, 139–148. [Google Scholar] [CrossRef]
- Meshram, C.; Obaidat, M.S.; Lee, C.-C.; Meshram, S.G. An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle. IEEE Syst. J. 2021, 15, 4927–4938. [Google Scholar] [CrossRef]
- Yang, X.-J.; Baleanu, D.; Srivastava, H.M. Local Fractional Integral Transforms and Their Applications; Academic Press: Cambridge, MA, USA, 2015; ISBN 0128040327. [Google Scholar]
- Han, S.; Chang, E. Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 2009, 39, 1283–1289. [Google Scholar] [CrossRef]
- Abdalla, M.; Fouque, P.-A.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. IEE Proc. Inf. Secur. 2006, 153, 27–39. [Google Scholar] [CrossRef]
- Dua, A.; Kumar, N.; Das, A.K.; Susilo, W. Secure message communication protocol among vehicles in smart city. IEEE Trans. Veh. Technol. 2017, 67, 4359–4373. [Google Scholar] [CrossRef]
- Das, A.K.; Wazid, M.; Kumar, N.; Khan, M.K.; Choo, K.-K.R.; Park, Y. Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J. Biomed. Health Inform. 2017, 22, 1310–1322. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Susilo, W. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Dependable Secur. Comput. 2017, 17, 391–406. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Conti, M.; Jo, M. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet Things J. 2018, 5, 269–282. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N.; Rodrigues, J.J.P.C. Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans. Dependable Secur. Comput. 2018, 17, 942–956. [Google Scholar] [CrossRef]
- Chang, C.-C.; Le, H.-D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2015, 15, 357–366. [Google Scholar] [CrossRef]
- Chattaraj, D.; Sarma, M.; Das, A.K. A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput. Netw. 2018, 131, 144–164. [Google Scholar] [CrossRef]
- Bellare, M.; Pointcheval, D.; Rogaway, P. Authenticated key exchange secure against dictionary attacks. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; Springer: Berlin/Heidelberg, Germany, 2000; pp. 139–155. [Google Scholar]
- Shoup, V. Sequences of games: A tool for taming complexity in security proofs. IACR Cryptol. ePrint Arch. 2004, 2004, 332. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).