By Topic

A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Vijay K. Gurbani ; Alcatel-Lucent, Bell Labs, 1960 Lucent Lane, Naperville, IL 60566 (USA) ; Vladimir Kolesnikov

Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol ({SIP}) has proven difficult. The challenge is to effectively exchange keys while preserving the features of the protocol (e.g., forking, re-targeting, request recursion, etc.), minimizing key exposure to unintended parties, eliminating voice clipping, maintaining end-to-end key privacy, interfacing with PSTN, etc. In this paper, we survey three key management protocols - SDES, ZRTP and DTLS-SRTP - that have been proposed for media keying, and evaluate them for use with SIP. To aid in the evaluation, we first extract (and justify) a core feature set from SIP. We then survey each key management protocol in detail and proceed to analyze the cores of the three protocols against this feature set to annotate their weaknesses and strengths.

Published in:

IEEE Communications Surveys & Tutorials  (Volume:13 ,  Issue: 2 )