scispace - formally typeset
Journal ArticleDOI

Survey of security vulnerabilities in session initiation protocol

TLDR
This article identifies and describes security problems in the SIP protocol that may lead to denial of service, including flooding attacks, security vulnerabilities in parser implementations, and attacks exploiting vulnerabilities at the signaling-application level.
Abstract
The open architecture of the Internet and the use of open standards like Session Initiation Protocol (SIP) constitute the provisioning of services (e.g., Internet telephony, instant messaging, presence, etc.) vulnerable to known Internet attacks, while at the same time introducing new security problems based on these standards that cannot been tackled with current security mechanisms. This article identifies and describes security problems in the SIP protocol that may lead to denial of service. Such security problems include flooding attacks, security vulnerabilities in parser implementations, and attacks exploiting vulnerabilities at the signaling-application level. A qualitative analysis of these security flaws and their impacts on SIP systems is presented.

read more

Citations
More filters
Journal ArticleDOI

A Survey of SIP Authentication and Key Agreement Schemes

TL;DR: This work identified, categorized and evaluated various SIP authentication and key agreement protocols according to their performance and security features, and observed that there are successful schemes from both the performance andSecurity viewpoint.
Journal ArticleDOI

Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers

TL;DR: This paper provides both theoretical proof and experimental evaluations in order to evince the adoptability of the proposed approach, called a FHE for blend operations model that uses tensor laws to carry the computations of blend arithmetic operations over real numbers.
Journal ArticleDOI

A Comprehensive Survey of Voice over IP Security Research

TL;DR: A comprehensive survey of Voice over IP security academic research is presented, using a set of 245 publications forming a closed cross-citation set, to provide a roadmap for researchers seeking to understand existing capabilities and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems.
Book

Understanding LTE and its Performance

TL;DR: In this article, the authors provide comprehensive coverage of current state of the art theoretical and technological aspects of broadband mobile and wireless networks focusing on Long Term Evolution Network (LTE) focusing on basic principles, and proceeds to the most advanced topics.
Journal ArticleDOI

A new authenticated key agreement for session initiation protocol

TL;DR: It is shown that the scheme of Yoon et al. is still vulnerable to stolen‐verifier attack and may also suffer from off‐line password guessing attack and a new security‐enhanced authentication scheme for SIP is proposed that maintains low computational complexity.
References
More filters
Book ChapterDOI

SIP: Session Initiation Protocol

TL;DR: Session Initiation Protocol (SIP) as discussed by the authors is an application layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants, such as Internet telephone calls, multimedia distribution, and multimedia conferences.
Proceedings Article

Hypertext Transfer Protocol -- HTTP/1.1

TL;DR: The Hypertext Transfer Protocol is an application-level protocol for distributed, collaborative, hypermedia information systems, which can be used for many tasks beyond its use for hypertext through extension of its request methods, error codes and headers.
ReportDOI

SDP: Session Description Protocol

Mark Handley, +1 more
TL;DR: This document defines the Session Description Protocol, SDP, intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation.

Remote Authentication Dial In User Service (RADIUS)

TL;DR: This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.

Diameter Base Protocol

TL;DR: The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting framework for applications such as network access or IP mobility, and needs to be supported by all Diameter implementations.
Related Papers (5)