Fig 4 - available via license: CC BY
Content may be subject to copyright.
Time consumption comparison of other scholars' protocols and ours. https://doi.org/10.1371/journal.pone.0213688.g004

Time consumption comparison of other scholars' protocols and ours. https://doi.org/10.1371/journal.pone.0213688.g004

Source publication
Article
Full-text available
Qiu et al. made a security analysis about the protocols of Chaudhry et al. and Kumari et al. in 2018, and they pointed out that there are many security weaknesses in the protocols. To improve the security, Qiu et al. proposed an advanced authentication scheme for Session Initiation Protocol on the basis of the previous protocols and claimed that th...

Contexts in source publication

Context 1
... experience of users play an important role in protocol. During this part, we will show a performance comparison between our scheme and the other schemes (see Fig 4). Before making a comparative analysis, we assume that one elliptic curve point multiplication operation is T pm , one hash function operation is T h . ...
Context 2
... the experiment, we run one hundred times to get the average data. According to the Fig 4, at registration phase, the time consumption in schemes of Qiu et al. [16], Chaudhry et al. [14] and we are all 0.00075s and Kumari et al.'s [15] scheme is 0.00088s. At password update phase, the time consumptions are 0.0018s, 0.001s, 0.0011s respectively. ...

Citations

... Secondly, [23] and [24] discovered that the Lu et al. mutual authentication protocol cannot withstand an impersonation attack, identity guessing attack and forgery attack. From Lu et al. both authors proposed improved mutual authentication protocol [25]. But according to [26], their schemes are vulnerable to several types of attacks, including as insider attacks and off-line guessing attacks. ...
... VoIP has grown in popularity over the past 20 years (Abualhaj, 2019a;Zhang et al., 2019). As the name implies, VoIP permits making phone calls over IP networks including Local Area Network (LAN) and Wide Area Network (WAN). ...
Article
Full-text available
The use of Voice over Internet Protocol (VoIP) innovation is rising due to its various merits. Nevertheless, the ineffective use of bandwidth is a key dilemma that restricts the fast-rising use of VoIP innovation. The main factor behind this ineffective use of the bandwidth is the sizable VoIP packet preamble. This research creates a technique to address this dilemma of packet preamble. The created technique is known as payload elimination (PldE). The fundamental concept of the PldE technique is to exploit the information (elements) of the VoIP packet preamble that is superfluous for point-to-point calls. In general, these elements are utilized to transport the payload of VoIP packets. Consequently, the payload size of VoIP packet will be lowered or removed, preserving the available bandwidth. The performance test of the PldE technique indicated an improvement of up to 41.6% in the exploitation of IP network bandwidth. So, the PldE technique is showing signs that it could help solve the problem of the IP network's inefficient use of bandwidth.
... Secondly, [23] and [24] discovered that the Lu et al. mutual authentication protocol cannot withstand an impersonation attack, identity guessing attack and forgery attack. From Lu et al. both authors proposed improved mutual authentication protocol [25]. But according to [26], their schemes are vulnerable to several types of attacks, including as insider attacks and off-line guessing attacks. ...
Article
Authentication is one of the security services that assures the system’s adequate security through identification and verification. Additionally, it guarantees that the communication party is who they claim to be. In politics, the economy, banking, daily life, and other areas, quantum identity authentication is essential to guarantee the security of information in communication. The multiphoton strategy is an improved version of the single-photon approach, with higher transmission rates and longer photon travel distances via the Quantum Communication network. Despite the advantages of multiphoton, enforcing authentication on behalf of numerous participants in the quantum channel remains a problem, since existing multiphoton only considers two parties involved in secret message sharing. The issue of scalability arises here when the number of parties involved in the quantum network increases. Furthermore, an eavesdropper might hide her position among other parties and take advantage of the situation to obtain a certain information. Therefore, we require a protocol, that creates a more secure environment in term of authentication in which multiple parties may freely and openly communicate. This paper further identifies research gaps covering critical aspect on how Quantum Identity Authentication (QIA) can be realized and effectively utilized for multiphoton without entanglement based. These include suggestion of future direction to implement multiphoton in multiparty from current protocol.
... The Internet's rapid expansion has resulted in the emergence of several new technologies, including Voice over IP (VoIP) (Abualhaj, 2019a;Zhang et al.,2019). VoIP technology, embraced by organizations, schools, colleges, and... etc., is expanding quickly. ...
Article
Full-text available
Voice over IP (VoIP) is widely utilized by organizations, schools, colleges, and so on. Nevertheless, VoIP numerous challenges that hinder its spread. One of the significant challenges is the poor exploit of the VoIP technology network bandwidth (BW), caused by the huge preamble of the VoIP packet. This paper suggests a novel methodology to manage this huge preamble overhead challenge. The proposed methodology is named runt payload VoIP packet (RPV). The core principle of the RPV methodology is to reemploy and exploit the VoIP packet preamble’s data (fields) that are superfluous by VoIP technology, especially for unicast IP voice calls. Generally, those fields will be used to convey the VoIP packet payload. Consequently, diminish or zero the length of the payload and, therefore, spare the BW. The results of the investigation into the suggested RPV methodology indicated significant enhancement in the BW exploitation of VoIP technology. For instance, the saved BW in the examined environment with the LPC codec came to up to 25.9%.
... In the same year, Zhang et al. [14] proposed a hash-based remote authentication protocol to improve the efficiency of user authentication. Although their protocol achieves high efficiency, it is vulnerable to known session-specific temporary information attack because the session key consists of short-term key and public messages. ...
... Although their protocol achieves high efficiency, it is vulnerable to known session-specific temporary information attack because the session key consists of short-term key and public messages. These protocols [12]- [14] can provide convenient services including remote healthcare system and mobile cloud computing to users. ...
... However, these authentication protocols [12]- [14] are difficult to apply to the e-government system that manages and communicates with multiple servers because they are proposed in single server environments. ...
Article
Full-text available
In electronic governance (e-governance) system, citizens can access government services such as transportation, licensing and immigration remotely over the Internet. With the development of information and communication technology, usage of the e-governance system has been increased. To efficiently provide citizens with various e-governance services, multi-server environments can be applied to the e-governance system. However, messages can be inserted, deleted, and modified by a malicious adversary since these are transmitted through a public channel. Therefore, many researchers have suggested mutual authentication protocols for secure communication in multi-server environments. In 2020, Sudhakar et al. proposed a smart card based lightweight authentication protocol for multi-server environments. We analyze Sudhakar et al. ’s protocol to propose a secure mutual authentication protocol in the e-governance system based on multi-server environments. However, we disclosure that their protocol is not resistant to smart card stolen, insider, man-in-the-middle, user impersonation, and session key disclosure attacks. Moreover, Sudhakar et al. ’s protocol does not provide mutual authentication. To improve these security problems, we suggest a secure three-factor mutual authentication protocol for the e-governance system based on multi-server environments. We prove our protocol’s security using informal security analysis, Burrows-Abadi-Needham (BAN) logic, and Real-or-Random (ROR) model. We also simulate our protocol utilizing Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. We estimate the proposed protocol’s security functionalities, computation costs, and communication overheads compared with existing related protocols. Consequently, we demonstrate that our protocol is secure and suitable for the e-governance system.
... Another source of SIP attacks is related to the SIP authentication schemes [13]. Several authentication schemes have been proposed for SIP including multiple-factor authentication methodologies [14]. Flooding attacks also constitute a representative number of service interruptions. ...
Article
Full-text available
Due to the high utilization of the Session Initiation Protocol (SIP) in the signaling of cellular networks and voice over IP multimedia systems, the avoidance of security vulnerabilities in SIP systems is a major aspect to assure that the operators can reach satisfactory readiness levels of service. This work is focused on the detection and prediction of abnormal signaling SIP dialogs as they evolve. Abnormal dialogs include two classes: the ones observed so far and thus labeled as abnormal and already known, but also the unknown ones, i.e., specific sequences of SIP messages there were never observed before. Taking advantage of recent advances in deep learning, we use Long Short-Term Memory (LSTM) recurrent neural networks (RNNs) to detect and predict dialogs already observed before. Additionally, and based on the outputs of the LSTM neural network, we propose two different classifiers capable of identifying unknown SIP dialogs, given the high level of vulnerability they may represent for the SIP operation. The proposed approaches achieve higher SIP dialogs detection scores in a shorter time when compared to a reference probabilistic-based approach. Moreover, the proposed detectors of unknown SIP dialogs achieve a detection probability above 94%, indicating its capability to detect a significant number of unknown SIP dialogs in a short amount of time.
... In the authentication attacks several vulnerabilities of the authentication protocols are explored. Multiple schemes have been proposed to reduce the existing SIP authentication vulnerabilities, including password-based one-factor authentication [21], [22], two-factor authentication based on password and smart cards [23], [24], and three-factor authentication that includes biometric data [25], [26]. ...
Article
Full-text available
In this paper, we propose a machine learning methodology for prediction of signaling sessions established with the Session Initiation Protocol (SIP). Given the increasing importance of predicting and detecting abnormal sequences of SIP messages to avoid SIP signaling-based attacks, we first propose a Bayesian inference method capable of representing the statistical relation between a SIP message, observed by a SIP user agent or a SIP server, and prior trustworthy SIP dialogs. The Bayesian inference method, a Hidden Markov Model (HMM) enriched with n-gram Markov observations, is updated over time, so the inference can be used in real-time. The HMM is then used for predicting and detecting SIP dialogs through a lightweight implementation of Viterbi algorithm for sparse state spaces. Experimental results are also reported, where a SIP dataset representing prior information collected by a SIP user agent and/or a SIP server is used to predict or detect if a received sequence of SIP messages is legitimate according to similar SIP dialogs already observed. Finally, we discuss the results obtained for a dataset of abnormal SIP sequences, not observed during the inference stage, showing the effective utility of the proposed methodology to detect abnormal SIP sequences in a short period of time.
... Over the years, Internet Protocol (IP) networks have embraced a big number of new technologies such as Voice over IP (VoIP) [1,2]. VoIP is consistently evolving and substituting the old telecommunication technology, in both business and domestic sectors. ...
... , where, BC is the Buffer Capacity in packet, BS is the Buffer Size in bytes, and Pkts is the Packet size in bytes. The next equation is used to calculate the buffer utilization improvement ratio, when using the SVF method rather than the RUI method: (2) Improvment % = SVF BC − RUI BC RUI BC × 100%. ...
Article
Full-text available
The inefficient use of the IP network bandwidth is a fundamental issue that restricts the exponential spreading of Voice over IP (VoIP). The primary reason for this is the big header size of the VoIP packet. In this paper, we propose a method, called Short Voice Frame (SVF), that addresses the big header size of the VoIP packet. The main idea of the SVF method is to make effective use of the VoIP packet header fields that are unneeded to the VoIP technology. In particular, these fields will be used for temporarily buffering the voice frame (VoIP packet payload) data. This will make the VoIP packet payload short or even zero in some cases. The performance evaluation of the proposed SVF method showed that the use of the IP network bandwidth has improved by up to 28.3% when using the G.723.1 codec.
... Qiu et al. (2018) showed that Kumari et al.'s protocol could not resist various attacks and they proposed an enhanced password authentication scheme for SIP with perfect forward secrecy. Zhang et al. (2019) noticed that Qiu et al.'s protocol suffers from denial of service attack and insider attack. They also proposed an improved and efficient mutual authentication scheme for SIP. ...
... According to Table 2, the computation overheads in the user and server between our protocol and Tu et al.'s protocol are almost same, the only change is the addition of two symmetric key operations and reduction of one hash operation in our protocol to provide the user anonymity. The computation cost in Zhang et al. (2019) is higher than the proposed protocol and it also suffers from various attacks such as our protocol is secure against various attacks unlike other related protocols. In Table 3, we study that protocols of Tu et al. (2014), Zhang et al. (2019Zhang et al. ( , 2017, Qui et al. (2018), Kumari (2017) and Kumari et al. (2015) do not provide the efficient login phase and Zhang et al. (2019) does not provide forward secrecy. ...
... The computation cost in Zhang et al. (2019) is higher than the proposed protocol and it also suffers from various attacks such as our protocol is secure against various attacks unlike other related protocols. In Table 3, we study that protocols of Tu et al. (2014), Zhang et al. (2019Zhang et al. ( , 2017, Qui et al. (2018), Kumari (2017) and Kumari et al. (2015) do not provide the efficient login phase and Zhang et al. (2019) does not provide forward secrecy. Tu et al.'s protocol suffers from impersonation attack. ...
... The explosive growth of the Internet has generated a considerable number of new services such as voice over Internet protocol (VoIP) [1,2]. VoIP adoption by companies, schools, universities, and other institutions is increasing exponentially due to various advantages such as affordable cost [3,4]. ...