{"title":"Secure authentication and key establishment in the SIP architecture","authors":"L. Malina, M. Zukal","doi":"10.1109/TSP.2011.6043786","DOIUrl":null,"url":null,"abstract":"This article deals with security features of SIP and focuses on advanced authentication and key establishment methods. These methods are described and a proposal of comprehensive security for the SIP architecture is presented in this article. The solution provides strong secure authentication of SIP users and protects against various attacks occurring in the SIP architecture. Furthermore, our proposal is implemented and tested. The experimental results from our proof of concept implementation are presented at the end of the text. Moreover, the conventional HTTP Digest method is also implemented and its performance is compared with methods in the proposal.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TSP.2011.6043786","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
This article deals with security features of SIP and focuses on advanced authentication and key establishment methods. These methods are described and a proposal of comprehensive security for the SIP architecture is presented in this article. The solution provides strong secure authentication of SIP users and protects against various attacks occurring in the SIP architecture. Furthermore, our proposal is implemented and tested. The experimental results from our proof of concept implementation are presented at the end of the text. Moreover, the conventional HTTP Digest method is also implemented and its performance is compared with methods in the proposal.