{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:33:09Z","timestamp":1757586789962,"version":"3.37.3"},"reference-count":19,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,21]],"date-time":"2020-11-21T00:00:00Z","timestamp":1605916800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Venture & Innovation Support Program for Chongqing Overseas Returnees","award":["CX2018122","cstc2020jcyj-msxmX0343","61702067","61872051"],"award-info":[{"award-number":["CX2018122","cstc2020jcyj-msxmX0343","61702067","61872051"]}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["CX2018122","cstc2020jcyj-msxmX0343","61702067","61872051"],"award-info":[{"award-number":["CX2018122","cstc2020jcyj-msxmX0343","61702067","61872051"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["CX2018122","cstc2020jcyj-msxmX0343","61702067","61872051"],"award-info":[{"award-number":["CX2018122","cstc2020jcyj-msxmX0343","61702067","61872051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2020,11,21]]},"abstract":"<jats:p>Session initiation protocol (SIP), a widely used signal protocol for controlling multimedia communication sessions, is under numerous attacks when performing the authentication steps between the user and server. So secure authentication schemes are needed to be presented for SIP. Recently, Arshad et al. advanced novel schemes for SIP using elliptic curve cryptography (ECC) and claimed their schemes can resist various attacks. However, Lu et al. found that Arshad et al.\u2019s scheme cannot resist trace and key-compromise impersonation attacks; hence, it cannot provide proper mutual authentication. Meanwhile, an enhanced scheme was advanced by Lu et al. and they stated that their scheme can stand up to possible known attacks. Nevertheless, in this paper, we conclude that Arshad and Nikooghadam\u2019s scheme is insecure against impersonation attack and Lu et al.\u2019s scheme is still vulnerable to impersonation attack. To overcome these weaknesses of their schemes, we present a novel anonymous ECC-based scheme for SIP. Security analysis and performance analysis show that our proposed scheme can resist various known attacks and efficient in the meantime.<\/jats:p>","DOI":"10.1155\/2020\/8886585","type":"journal-article","created":{"date-parts":[[2020,11,21]],"date-time":"2020-11-21T23:20:08Z","timestamp":1606000808000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["An Anonymous and Efficient ECC-Based Authentication Scheme for SIP"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4116-6608","authenticated-orcid":true,"given":"Yousheng","family":"Zhou","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"},{"name":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4414-0964","authenticated-orcid":true,"given":"Xinyun","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]}],"member":"311","reference":[{"volume-title":"Sip: session initiation protocol","year":"2002","author":"H. Schulzrinne","key":"1"},{"issue":"1","key":"2","first-page":"12","article-title":"Efficient nonce-based authentication scheme for session initiation protocol","volume":"9","author":"J. L. Tsai","year":"2009","journal-title":"IJ Network Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.62780"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1286"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.42.4.2496"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1885-6"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0363-x"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1672"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0460-1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2499"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1807-z"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2282-x"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/894549"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2605087"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/358722.358740"},{"first-page":"689","article-title":"A study of probabilistic password models","author":"J. Ma","key":"16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.091513.00050"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008354106356"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8886585.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8886585.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8886585.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,21]],"date-time":"2020-11-21T23:20:15Z","timestamp":1606000815000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2020\/8886585\/"}},"subtitle":[],"editor":[{"given":"Mario","family":"Kolberg","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,21]]},"references-count":19,"alternative-id":["8886585","8886585"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8886585","relation":{},"ISSN":["1530-8677","1530-8669"],"issn-type":[{"type":"electronic","value":"1530-8677"},{"type":"print","value":"1530-8669"}],"subject":[],"published":{"date-parts":[[2020,11,21]]}}}