By Topic

Secure authentication and key establishment in the SIP architecture

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Malina, L. ; Brno Univ. of Technol., Brno, Czech Republic ; Zukal, M.

This article deals with security features of SIP and focuses on advanced authentication and key establishment methods. These methods are described and a proposal of comprehensive security for the SIP architecture is presented in this article. The solution provides strong secure authentication of SIP users and protects against various attacks occurring in the SIP architecture. Furthermore, our proposal is implemented and tested. The experimental results from our proof of concept implementation are presented at the end of the text. Moreover, the conventional HTTP Digest method is also implemented and its performance is compared with methods in the proposal.

Published in:

Telecommunications and Signal Processing (TSP), 2011 34th International Conference on

Date of Conference:

18-20 Aug. 2011