Computer Science – Cryptography and Security
Scientific paper
2010-02-05
International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 2, January 2010, http://ijcsi.org/articles/Tow
Computer Science
Cryptography and Security
International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 2, January 2010, http://ijcsi.org/articles/Tow
Scientific paper
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.
Azfar Abdullah
Hasib Abdullah Al
Morshed Sarwar Md.
No associations
LandOfFree
Towards Public Key Infrastructure less authentication in Session Initiation Protocol does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Towards Public Key Infrastructure less authentication in Session Initiation Protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Towards Public Key Infrastructure less authentication in Session Initiation Protocol will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-535161