Skip to main content

Experimental Validation of New SIP Authentication Protocol

  • Conference paper
  • First Online:
Big Data and Networks Technologies (BDNT 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 81))

Included in the following conference series:

Abstract

In the last decade, Session Initiation Protocol (SIP) is the most popular application layer protocol created in order to manage multimedia sessions over IP protocol. SIP is not used only by telephony over IP (ToIP), but it can be used also by other in line application such as instant message, video conferences, and others. Since SIP inherits the security threats of IP which are added to SIP owner problems, the security of SIP services must be enhanced. Recently, we have designed a new SIP authentication protocol. Then, we have proved theoretically that our protocol is secured against various attacks. In this paper, we use the API JAIN SIP to implement our protocol. Therefore, we have tested developed applications in local area network. The obtained results confirm that our proposed protocol is efficient when it is compared with some implemented protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E: SIP: session initiation protocol. No. RFC 3261 (2002)

    Google Scholar 

  2. Thom, G.A.: H. 323: the multimedia communications standard for local area networks. IEEE Commun. Mag. 34(12), 52–56 (1996)

    Article  Google Scholar 

  3. Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., Stewart, L.: HTTP authentication: basic and digest access Authentication, June 1999

    Google Scholar 

  4. Arshad, H., Nikooghadam, M.: An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools Appl. 75(1), 181–197 (2016)

    Article  Google Scholar 

  5. Lin, H., Wen, F., Du, C.: An anonymous and secure authentication and key agreement scheme for session initiation protocol. Multimedia Tools and Appl. 76(2), 2315–2329 (2017)

    Article  Google Scholar 

  6. Farash, M.: Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Appl. 9, 1–10 (2014). https://doi.org/10.1007/s12083-014-0315-x

    Article  Google Scholar 

  7. Azrour, M., Farhaoui, Y., Ouanan, M.: Weakness in Zhang et al.’s authentication protocol for session initiation protocol. In: Ezziyyani, M., Bahaj, M., Khoukhi, F. (eds.) AIT2S 2017. LNNS, vol. 25, pp. 239–251. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-69137-4_22

    Chapter  Google Scholar 

  8. Arshad, H., Nikooghadam, M.: An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimed Tools Appl. (2014). https://doi.org/10.1007/s11042-014-2282-x

    Article  Google Scholar 

  9. Zhu, W., Chen, J., He, D.: Enhanced authentication protocol for session initiation protocol using smart card. Int. J. Electron. Secur. Digit. Forensics 7(4), 330–342 (2015)

    Article  Google Scholar 

  10. Chaudhry, S.A., Mahmood, K., Naqvi, H., Sher, M.: A secure authentication scheme for session initiation protocol based on elliptic curve cryptography. In: 2015 IEEE International Conference on Computer and Information Technology, Ubiquitous Computing and Communications. Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (2015)

    Google Scholar 

  11. Kumari, S., Chaudhry, A., Wu, F., Li., X., Farash, M.S., Khan, M.K.: An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. (2015)

    Google Scholar 

  12. Wu, K., Gong, P., Wang, J., Yan, X., Li, P.: An improved authentication protocol for session initiation protocol using smart card and elliptic curve cryptography. Rom. J. Inf. Sci. Technol. 16(4), 324–335 (2013)

    Google Scholar 

  13. Azrour, M., Ouanan, M., Farhaoui, Y.: SIP authentication protocols based on elliptic curve cryptography: survey and comparison. Indonesian J. Electric. Eng. Comput. Sci. 4(1), 231–239 (2016)

    Article  Google Scholar 

  14. Azrour, M., Farhaoui, Y., Ouanan, M.: A server spoofing attack on Zhang et al. SIP authentication protocol. Int. J. Tomogr. Simul. 30(3), 47–58 (2017)

    Google Scholar 

  15. Azrour, M., Farhaoui, Y., Ouanan, M.: Cryptanalysis of Farash et al.’s SIP authentication protocol. Int. J. Dyn. Syst. Differ. Equ. 8(1–2), 77–94 (2018)

    MathSciNet  Google Scholar 

  16. Azrour, M., Ouanan, M., Farhaoui, Y., Guezzaz, A.: Security analysis of Ye et al. authentication protocol for internet of things. In: Farhaoui, Y., Moussaid, L. (eds.) ICBDSDE 2018. SBD, vol. 53, pp. 67–74. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12048-1_9

    Chapter  Google Scholar 

  17. Azrour, M., Ouanan, M., Farhaoui, Y.: A new efficient SIP authentication and key agreement protocol based on chaotic maps and using smart card. In: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, p. 70. ACM, November 2017

    Google Scholar 

  18. Azrour, M., Ouanan, M., Farhaoui, Y.: Survey of SIP malformed messages detection. Indonesian J. Electric. Eng. Comput. Sci. 7(2), 457–465 (2017)

    Article  Google Scholar 

  19. Tsiatsikas, Z., Kambourakis, G., Geneiatakis, D., Wang, H.: The devil is in the detail: sdp-driven malformed message attacks and mitigation in sip ecosystems. IEEE Access 7, 2401–2417 (2019)

    Article  Google Scholar 

  20. Azrour, M., Ouanan, M., Farhaoui, Y.: A new architecture to protect sip server against flooding attack. Int. J. Tomogr. Simul. 31(3), 15–28 (2018)

    Google Scholar 

  21. Dassouki, K., Safa, H., Hijazi, A., El-Hajj, W.: A SIP delayed based mechanism for detecting VOIP flooding attacks. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 588–593. IEEE. (2016)

    Google Scholar 

  22. Azrour, M., Farhaoui, Y., Ouanan, M., Guezzaz, A.: SPIT detection in telephony over ip using k-means algorithm. Procedia Comput. Sci. 148, 542–551 (2019)

    Article  Google Scholar 

  23. Chikha, R.J.B., Abbes, T., Chikha, W.B., Bouhoula, A.: Behavior-based approach to detect spam over IP telephony attacks. Int. J. Inf. Secur. 2(15), 131–143 (2016)

    Article  Google Scholar 

  24. Azrour, M., Farhaoui, Y., Ouanan, M.: A new secure authentication and key exchange protocol for session initiation protocol using smart card. Int. J. Network Secur. 195(6), 870–879 (2017). https://doi.org/10.6633/IJNS.201711.19(6).02

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mourade Azrour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Azrour, M., Farhaoui, Y., Guezzaz, A. (2020). Experimental Validation of New SIP Authentication Protocol. In: Farhaoui, Y. (eds) Big Data and Networks Technologies. BDNT 2019. Lecture Notes in Networks and Systems, vol 81. Springer, Cham. https://doi.org/10.1007/978-3-030-23672-4_1

Download citation

Publish with us

Policies and ethics