Skip to main content

Formalization and Verification of SIP Using CSP

  • Conference paper
  • First Online:
Parallel and Distributed Computing, Applications and Technologies (PDCAT 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13798))

  • 522 Accesses

Abstract

As one of the most popular multimedia communication protocol, Session Initiation Protocol (SIP) has lots of interesting features, such as extensible and open communication. However, with its rapid development, load balance problem and security risks are exposed. Finding the suitable method to solve the two problems has become an important issue. In this paper, we first apply Communicating Sequential Processes (CSP) to model SIP, then adopt the model checking tool Process Analysis Tookit (PAT) to verify the internal properties and the safety properties of our model. The verification results show that the SIP model has load balance problem and it cannot assure the security of data with malicious users. So we enhance it by adding Software Defined Networking (SDN) architecture and identity authentication mechanism in the process. In the light of new verification results, it can be found that the improved model can satisfy the internal properties and we succeed in improving the security of the SIP model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rosenberg, J.D., et al.: SIP: session initiation protocol. RFC 3261: 1-269 (2002)

    Google Scholar 

  2. Liu, J., Liu, L.: A coloured Petri Net approach to the functional and performance analysis of SIP non-INVITE transaction. Trans. Petri Nets Other Model. Concurr. 9, 147–177 (2014)

    MathSciNet  MATH  Google Scholar 

  3. Gehlot, V., Nigro, C.: Colored Petri Net model of the session initiation protocol (SIP). In: IECON, pp. 2150–2155 (2010)

    Google Scholar 

  4. Yang, P., Yuan, Z., Wang, J.: Petri Net model of session initiation protocol and its verification. In: WICOM 2007, pp. 1861–1864 (2007)

    Google Scholar 

  5. Montazerolghaem, A.R., Moghaddam, M.H.Y., Leon-Garcia, A.: OpenSIP: toward software-defined SIP networking. IEEE Trans. Netw. Serv. Manag. 15(1), 184–199 (2018)

    Article  Google Scholar 

  6. Montazerolghaem, A.: SIP server load balancing based on SDN. CoRR abs/1908.04047 (2019)

    Google Scholar 

  7. Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Hoboken (1985). ISBN 0-13-153271-5

    MATH  Google Scholar 

  8. Lowe, G., Roscoe, B.: Using CSP to detect errors in the TMN protocol. IEEE Trans. Software Eng. 23(10), 659–669 (1997)

    Article  Google Scholar 

  9. PAT: Process analysis toolkit. http://pat.comp.nus.edu.sg

  10. Si, Y., et al.: Model checking with fairness assumptions using PAT. Front. Comput. Sci. 8(1), 1–16 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  11. Bai, Y., Ye, X., Ma, Y.: Formal modeling and analysis of SIP using colored Petri Nets. In: WICOM (2011). https://doi.org/10.1109/wicom.2011.6040445

  12. Lu, Y., Li, L., Peng, H., Yang, Y.: A secure and efficient mutual authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 9(2), 449–459 (2016)

    Article  Google Scholar 

  13. Kreutz, D., Ramos, F.M.V., Veríssimo, P., Rothenberg, C., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)

    Article  Google Scholar 

  14. Salsano, S., Veltri, L., Papalilo, D.: SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw. 16(6), 38–44 (2002)

    Article  Google Scholar 

  15. Chaudhry, S.A., Naqvi, H., Sher, M., Farash, M.S., Hassan, M.U.: An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Netw. Appl. 10(1), 1–15 (2017)

    Article  Google Scholar 

  16. International Telecommunication Union: Packet-base Multimedia Communication Systems. ITU-T Recommendation H.323 (1999)

    Google Scholar 

  17. Roscoe, A.W., Huang, J.: Checking noninterference in timed CSP. Formal Aspects Comput. 25(1), 3–35 (2013)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was partially supported by the National Natural Science Foundation of China (Grant Nos. 62032024, 61872145), the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (Grant No. 22510750100), Shanghai Trusted Industry Internet Software Collaborative Innovation Center, and the Dean’s Fund of Shanghai Key Laboratory of Trustworthy Computing (East China Normal University).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huibiao Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hou, Z., Yin, J., Zhu, H., Chen, N. (2023). Formalization and Verification of SIP Using CSP. In: Takizawa, H., Shen, H., Hanawa, T., Hyuk Park, J., Tian, H., Egawa, R. (eds) Parallel and Distributed Computing, Applications and Technologies. PDCAT 2022. Lecture Notes in Computer Science, vol 13798. Springer, Cham. https://doi.org/10.1007/978-3-031-29927-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-29927-8_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-29926-1

  • Online ISBN: 978-3-031-29927-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics