Implementing a secure VoIP communication over SIP-based networks

被引:0
作者
Wen-Bin Hsieh
Jenq-Shiou Leu
机构
[1] National Taiwan University of Science and Technology,Department of Electronic and Computer Engineering
来源
Wireless Networks | 2018年 / 24卷
关键词
Security; VoIP; SIP; ECDH; ECMQV;
D O I
暂无
中图分类号
学科分类号
摘要
Recent years the Session Initiation Protocol (SIP) is commonly used in establishing Voice over IP (VoIP) calls and has become the centerpiece for most VoIP architecture. As wireless and mobile all-IP networks become prosperous, free VoIP applications are utilized in all places. Consequently, the security VoIP is a crucial requirements for its adoption. Many authentication and key agreement schemes are proposed to protect the SIP messages, however, lacking concrete implementations. The performance of VoIP is critical for users’ impressions. In view of this, this paper studies the performance impact of using key agreements, elliptic curve Diffie–Hellman and elliptic curve Menezes–Qu–Vanstone, for making a SIP-based VoIP call. We evaluate the key agreement cost using spongycastle.jce.provider package in Java running on android-based mobile phones, the effect of using different elliptic curves and analyze the security of both key agreements. Furthermore, we design a practical and efficient authentication mechanism to deploy our VoIP architecture and show that a VoIP call can be established in an acceptable interval. As a result, this paper provides a concrete and feasible architecture to secure a VoIP call.
引用
收藏
页码:2915 / 2926
页数:11
相关论文
共 31 条
[1]  
Geneiatakis D(2008)An ontology based-policy for deploying secure sip-based VoIP services Computer and Security 27 285-297
[2]  
Lambrinoudakis C(2006)Survey of security vulnerabilities in session initiation protocol IEEE Communications Surveys & Tutorials 8 68-81
[3]  
Kambourakis G(2002)SIP security issues: The SIP authentication procedure and its processing load IEEE Network 16 38-44
[4]  
Geneiatakis D(2007)A framework for protecting SIP-based infrastructure against malformed message attacks Computer Networks 51 2580-2593
[5]  
Dagiuklas T(2012)A new authenticated key agreement for session initiation protocol International Journal of Communication Systems 25 47-54
[6]  
Kambourakis G(2012)The impact of TLS on SIP server performance: Measurement and modeling IEEE/ACM Transactions on Networking 20 1217-1230
[7]  
Lambrinoudakis C(1987)Elliptic curve cryptosystems Mathematics of Computation 48 203-209
[8]  
Gritzalis S(2005)Secure authentication scheme for session initiation protocol Computers & Security 24 381-386
[9]  
Ehlert S(2007)A lightweight protection mechanism against signaling attacks in a sip-based VoIP environment Telecommunication Systems 36 153-159
[10]  
Salsano S(2014)Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks Wireless Communications and Mobile Computing 14 995-1006