Secure Authentication and Key Establishment in the SIP Architecture

被引:0
作者
Malina, Lukas [1 ]
Zukal, Martin [1 ]
机构
[1] Brno Univ Technol, Brno 61200, Czech Republic
来源
2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP) | 2011年
关键词
authentication; key establishment; multimedia; security; SIP;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article deals with security features of SIP and focuses on advanced authentication and key establishment methods. These methods are described and a proposal of comprehensive security for the SIP architecture is presented in this article. The solution provides strong secure authentication of SIP users and protects against various attacks occurring in the SIP architecture. Furthermore, our proposal is implemented and tested. The experimental results from our proof of concept implementation are presented at the end of the text. Moreover, the conventional HTTP Digest method is also implemented and its performance is compared with methods in the proposal.
引用
收藏
页码:14 / 18
页数:5
相关论文
共 21 条
  • [1] Andreasen F., 2006, 4568 IETF RFC
  • [2] [Anonymous], 2004, 3830 RFC
  • [3] [Anonymous], P1363 IEEE
  • [4] ANSI, 1999, X963199X ANSI
  • [5] Baugher M., 2004, 3711 IETF RFC
  • [6] Cika P., 2010, 33 INT C TEL SIGN PR, P1
  • [7] Durlanik A, 2005, PROC WRLD ACAD SCI E, V8, P350
  • [8] El-Moussa F., 2010, LNICST, P82
  • [9] Guillet T., 2009, ICICS
  • [10] Handley M, 1998, 2327 IETF RFC