publication . Article . 2014

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

Liping Zhang; Shanyu Tang; Shaohui Zhu;
Open Access English
  • Published: 08 Nov 2014
  • Publisher: Springer
  • Country: United Kingdom
Abstract
Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from the viewpoint of both performance and security, because performance and security as two critical factors affecting SIP applications always seem contradictory.\ud In this stud...
Subjects
ACM Computing Classification System: ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
free text keywords: Cyber-security, Information-security, Computer Networks and Communications, Software, Voice over IP, business.industry, business, Computer science, Authentication protocol, Computer security, computer.software_genre, computer, Biometrics, Computer network, Information security, Otway–Rees protocol, Session Initiation Protocol, computer.internet_protocol, Symmetric-key algorithm, Security association
Related Organizations

[1] Rosenberg J., Schulzrinne H., et al. (2002) SIP: Session Initiation Protocol. RFC 3261, June.

[2] D. Geneiatakis, C. Lambrinoudakis, and G. Kambourakis (2008) An ontology based-policy for deploying secure sip-based voip services. Computer and Security, 27(7-8): 285-297. [OpenAIRE]

[3] J. Franks, P. Hallam-Baker, J. Hostetler, et al. (1999) HTTP Authentication: Basic and Digest Access Authentication. Internet Engineering Task Force, RFC 2617.

[4] H.Hakan, Kilinc, Tugrul Yanik (2013). A Survey of SIP Authentication and Key Agreement Schemes. IEEE communications surveys & tutorials, DOI: 10.1109/SURV.2013.091513.00050.

[5] T. Yanik, H. H. Kilinc, M. Sarioz, and S. S.Erdem(2008) Evaluating SIP Proxy Servers Based on Real Performance Data. SPECTS2008.

[6] Yang C, Wang R, Liu W. (2005). Secure authentication scheme for session initiation protocol. Computers & Security, 24:381-386.

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . 2014

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

Liping Zhang; Shanyu Tang; Shaohui Zhu;