Open AccessPosted Content
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
Reads0
Chats0
TLDR
This paper aims to present an overview of different authentication methods used in or together with SIP including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF).Abstract:
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from preshared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.read more
Citations
More filters
Journal ArticleDOI
A Survey of SIP Authentication and Key Agreement Schemes
H. Hakan Kilinc,Tugrul Yanik +1 more
TL;DR: This work identified, categorized and evaluated various SIP authentication and key agreement protocols according to their performance and security features, and observed that there are successful schemes from both the performance andSecurity viewpoint.
Proceedings ArticleDOI
Securing SIP infrastructures with PKI — The analysis
TL;DR: The article focuses on the present state analysis of use and cooperation of RTC and PKI in order to provide forms of better and more complex RTC security.
Journal ArticleDOI
Safety technologies impacts survey in M-services security provision
TL;DR: The future trends of mobile technology in the world and current condition of mobile users in Iran have investigated and the importance of different security technologies within six types of mobile service have scrutinized.
Proceedings ArticleDOI
Survey of real-time multimedia security mechanisms
TL;DR: This paper is focused on real-time communication based on SIP signalization protocol and overview of security of signalization and description of techniques used to secure signalization in multimedia communication.
Journal ArticleDOI
A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment
TL;DR: An efficient Framework of N-Screen Session Manager is proposed which manages all media signaling that are necessary to deliver demanded contents and provides user with playback multimedia contents method (TV Drama, Ads, and Dialog etc) which is not considered in other research papers.
References
More filters
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Book ChapterDOI
SIP: Session Initiation Protocol
Jonathan Rosenberg,Henning Schulzrinne,G. Camarillo,Alan B. Johnston,J. Peterson,Robert Sparks,Mark Handley,Eve M. Schooler +7 more
TL;DR: Session Initiation Protocol (SIP) as discussed by the authors is an application layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants, such as Internet telephone calls, multimedia distribution, and multimedia conferences.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
ReportDOI
SDP: Session Description Protocol
Mark Handley,Van Jacobson +1 more
TL;DR: This document defines the Session Description Protocol, SDP, intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation.
Book ChapterDOI
Certificateless Public Key Cryptography
TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.