Efficient and Secure Authentication Protocols for Mobile VoIP Communications

Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerable to information security. In this paper, we present two efficient and secure authentication protocols for mobile VoIP services. In our approaches, we first develop a secure authentication protocol for mobile IP registration procedure. And then, based on this authenticated process, we extend the similar concept to a SIP-based VoIP service, and thus propose the second simple and secure communication protocol. For verifying our contributions, we demonstrate our proposed protocols secure and efficient: (1) by conducting security analysis on the aspects of data integrity, confidentiality, and several common network attacks, such as replay, man-in-the-middle; and (2) by conducting simulations and showing comparison results with other existing protocols, in terms of the communication and computation overheads imposed on the mobile node. All results point out that our protocols are superior to others.

[1]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[2]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[3]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[4]  Karim El Malki Low-Latency Handoffs in Mobile IPv4 , 2007 .

[5]  Stephen T. Kent,et al.  A public‐key based secure Mobile IP , 1999, Wirel. Networks.

[6]  Kwok-Yan Lam,et al.  Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).

[7]  G.A. Mills-Tettey,et al.  Mobile Voice Over IP (MVOIP): an application-level protocol for call hand-off in real time applications , 2002, Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (Cat. No.02CH37326).

[8]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[9]  Melody Moh,et al.  Mobile IP telephony: mobility support of SIP , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).

[10]  Chin-Chen Chang,et al.  A secure one-time password authentication scheme with low-computation for mobile communications , 2004, OPSR.

[11]  M. Mufti,et al.  Design and implementation of a secure Mobile IP protocol , 2004, 2004 International Networking and Communication Conference.

[12]  Henning Schulzrinne,et al.  Mobility support using SIP , 1999, WOWMOM '99.

[13]  Ashar Aziz,et al.  Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.

[14]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[15]  Charles E. Perkins,et al.  IP Mobility Support version 2 , 1997 .

[16]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[17]  Wanjiun Liao Mobile Internet telephony protocol: an application layer protocol for mobile Internet telephony services , 1999, 1999 IEEE International Conference on Communications (Cat. No. 99CH36311).

[18]  Henning Schulzrinne,et al.  The Session Initiation Protocol: Internet-centric signaling , 2000, IEEE Commun. Mag..

[19]  Stuart Jacobs Mobile IP Public Key Based Authentication , 2001 .

[20]  Jinn-ke Jan,et al.  A new efficient MAKEP for wireless communications , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[21]  Cheng-Chi Lee,et al.  A flexible remote user authentication scheme using smart cards , 2002, OPSR.

[22]  Ramjee Prasad,et al.  Mobility management for VoIP in 3G systems: evaluation of low-latency handoff schemes , 2005, IEEE Wireless Communications.