Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)

  • Daniel J. Martínez-Manzano
  • Gabriel López
  • Antonio F. Gómez-Skarmeta
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4347)

Abstract

When organizations need to exchange critical information they need to rely on dependable and resilient channels, which define a trusted overlay network over the underlying IP infrastructure. Today, secure information sharing in these scenarios has become a main concern for domain administrators. To solve this problem, current research initiatives are focused on the establishment of (usually static) trust relationships and security services among such organizations. This paper analyzes the usage of the standard Session Initiation Protocol (SIP) for performing a multidomain virtual negotiation, in order to dynamically protect the exchange of critical data from the security risks of the public networks. As an example of this proposal, a prototype is presented in the context of secure overlay networks. This prototype shows also the integration of the virtual negotiation process with a Policy Based Network Management infrastructure (PBNM), in order to provide the security policies required by each organization.

Keywords

Secure Information Sharing Overlay Virtual Negotiation SIP 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., Morris, R.: Resilient Overlay Networks. In: Proceedings of the 18th Symposium on Operating Systems Principles (2001)Google Scholar
  2. 2.
    Arkko, J., Torvinen, V., Niemi, A., Haukka, T.: Security Mechanism Agreement for the Session Initiation Protocol (SIP). IETF RFC 3329 (January 2003)Google Scholar
  3. 3.
    Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Security for structured peer-to-peer overlay networks. In: Proceedings of the 5th symposium on Operating Systems Design and Implementation OSDI 2002 (December 2002)Google Scholar
  4. 4.
    Dierks, T., Allen, C.: The TLS protocol version 1.0. IETF RFC 2246 (January 1999)Google Scholar
  5. 5.
    Durham, D., et al.: The COPS (Common Open Policy Service) protocol. IETF RFC 2748 (January 2000)Google Scholar
  6. 6.
    Rosenberg, J., et al.: SIP: Session Initiation Protocol. IETF RFC 3261 (June 2002)Google Scholar
  7. 7.
    ITU-T. ITU-T Recommendation H.323. Packet-based multimedia communications systems (July 2003)Google Scholar
  8. 8.
    Kay, M.: XSL Transformations (XSLT) Version 2.0. W3C Recommendation. World Wide Web Consortium (W3C) (November 2005)Google Scholar
  9. 9.
    Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. IETF RFC 2401 (November 1998)Google Scholar
  10. 10.
    Keromystis, A., Misra, V., Rubenstein, D.: SOS: Secure Overlay Services. In: Proceedings of ACM SIGCOMM (August 2002)Google Scholar
  11. 11.
    University of Murcia. Spain. UMU Policy Based Network Management (UMU-PBNM) (June 2006), http://pbnm.dif.um.es
  12. 12.
    Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: Proceedings of the 2001 conference on applications, technologies, architectures and protocols for computer communications (2001)Google Scholar
  13. 13.
    Rosenberg, J., Schulzrinne, H.: Session Initiation Protocol (SIP): Locating SIP servers. IETF RFC 3263 (June 2002)Google Scholar
  14. 14.
    Rosenberg, J., Schulzrinne, H., Kyzivat, P.: Caller Preferences for the Session Initiation Protocol (SIP). IETF RFC 3841 (August 2004)Google Scholar
  15. 15.
    Rosenberg, J., Shulzrinne, H., Kyzivat, P.: Indicating User Agent Capabilities in the Session Initiation Protocol (SIP). IETF RFC 3840 (August 2004)Google Scholar
  16. 16.
    Shi, S.: Design of Overlay Networks for Internet Multicast, PhD Thesis (August 2002)Google Scholar
  17. 17.
    Touch, J., Hotz, S.: The X-Bone. In: Third Global Internet Mini-Conference at Globecom 1998 (November 1998)Google Scholar
  18. 18.
    Touch, J., Wang, Y., Pingali, V., Eggert, L., Zhou, R.: A Global X-Bone for Network Experiments. In: Finn. Proc. IEEE Tridentcom 2005 (March 2005)Google Scholar
  19. 19.
    Verma, D.C.: Simplyfing network administrator using policy-based management. IEEE Network 20-6(16) (2002)Google Scholar
  20. 20.
    Yergau, F., Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E.: Extensible Markup Language (XML) 1.0, 3rd edn., W3C Recommendation. World Wide Web Consortium (W3C) (February 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Daniel J. Martínez-Manzano
    • 1
  • Gabriel López
    • 1
  • Antonio F. Gómez-Skarmeta
    • 1
  1. 1.Department of Information and Communications EngineeringUniversity of MurciaSpain

Personalised recommendations