Formal modeling of authentication in SIP
نویسندگان
چکیده
The Session Initiation Protocol is increasingly used as a signaling protocol for administrating VoIP phone calls. Careless configuration of the SIP protocol is known to lead to a large set of attacks. SIP can be configured in several ways so that different functional and security requirements are met. Tools exist for attacking Voice over IP protocols, yet most tools target the message traffic as-
منابع مشابه
ملزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملA Robust and E cient SIP Authentication Scheme
The Session Initiation Protocol (SIP), which is becoming the de facto standard for the next-generation VoIP networks, is currently receiving much attention in many aspects. One aspect that was not deeply addressed in the original SIP is its authentication procedure. Apart from its security, an SIP authentication procedure should be e cient. This paper proposes a robust and e cient three-party S...
متن کاملA robust ECC based mutual authentication protocol with anonymity for session initiation protocol
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed p...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملAnalysis and Modeling of VoIP Servers: A Linear Programming Approach
The SIP protocol was standardized by the IETF at the application layer for initiating, managing, and terminating multimedia sessions and has been widely used as the main signaling protocol on both the Internet and VoIP networks. Most challenges in this protocol are overload and lack of proper state distribution. These challenges cause a wide range of next-generation network users to face a shar...
متن کامل