Abstract
As one of the most popular multimedia communication protocol, Session Initiation Protocol (SIP) has lots of interesting features, such as extensible and open communication. However, with its rapid development, load balance problem and security risks are exposed. Finding the suitable method to solve the two problems has become an important issue. In this paper, we first apply Communicating Sequential Processes (CSP) to model SIP, then adopt the model checking tool Process Analysis Tookit (PAT) to verify the internal properties and the safety properties of our model. The verification results show that the SIP model has load balance problem and it cannot assure the security of data with malicious users. So we enhance it by adding Software Defined Networking (SDN) architecture and identity authentication mechanism in the process. In the light of new verification results, it can be found that the improved model can satisfy the internal properties and we succeed in improving the security of the SIP model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rosenberg, J.D., et al.: SIP: session initiation protocol. RFC 3261: 1-269 (2002)
Liu, J., Liu, L.: A coloured Petri Net approach to the functional and performance analysis of SIP non-INVITE transaction. Trans. Petri Nets Other Model. Concurr. 9, 147–177 (2014)
Gehlot, V., Nigro, C.: Colored Petri Net model of the session initiation protocol (SIP). In: IECON, pp. 2150–2155 (2010)
Yang, P., Yuan, Z., Wang, J.: Petri Net model of session initiation protocol and its verification. In: WICOM 2007, pp. 1861–1864 (2007)
Montazerolghaem, A.R., Moghaddam, M.H.Y., Leon-Garcia, A.: OpenSIP: toward software-defined SIP networking. IEEE Trans. Netw. Serv. Manag. 15(1), 184–199 (2018)
Montazerolghaem, A.: SIP server load balancing based on SDN. CoRR abs/1908.04047 (2019)
Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Hoboken (1985). ISBN 0-13-153271-5
Lowe, G., Roscoe, B.: Using CSP to detect errors in the TMN protocol. IEEE Trans. Software Eng. 23(10), 659–669 (1997)
PAT: Process analysis toolkit. http://pat.comp.nus.edu.sg
Si, Y., et al.: Model checking with fairness assumptions using PAT. Front. Comput. Sci. 8(1), 1–16 (2014)
Bai, Y., Ye, X., Ma, Y.: Formal modeling and analysis of SIP using colored Petri Nets. In: WICOM (2011). https://doi.org/10.1109/wicom.2011.6040445
Lu, Y., Li, L., Peng, H., Yang, Y.: A secure and efficient mutual authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 9(2), 449–459 (2016)
Kreutz, D., Ramos, F.M.V., Veríssimo, P., Rothenberg, C., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)
Salsano, S., Veltri, L., Papalilo, D.: SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw. 16(6), 38–44 (2002)
Chaudhry, S.A., Naqvi, H., Sher, M., Farash, M.S., Hassan, M.U.: An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Netw. Appl. 10(1), 1–15 (2017)
International Telecommunication Union: Packet-base Multimedia Communication Systems. ITU-T Recommendation H.323 (1999)
Roscoe, A.W., Huang, J.: Checking noninterference in timed CSP. Formal Aspects Comput. 25(1), 3–35 (2013)
Acknowledgements
This work was partially supported by the National Natural Science Foundation of China (Grant Nos. 62032024, 61872145), the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (Grant No. 22510750100), Shanghai Trusted Industry Internet Software Collaborative Innovation Center, and the Dean’s Fund of Shanghai Key Laboratory of Trustworthy Computing (East China Normal University).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hou, Z., Yin, J., Zhu, H., Chen, N. (2023). Formalization and Verification of SIP Using CSP. In: Takizawa, H., Shen, H., Hanawa, T., Hyuk Park, J., Tian, H., Egawa, R. (eds) Parallel and Distributed Computing, Applications and Technologies. PDCAT 2022. Lecture Notes in Computer Science, vol 13798. Springer, Cham. https://doi.org/10.1007/978-3-031-29927-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-031-29927-8_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29926-1
Online ISBN: 978-3-031-29927-8
eBook Packages: Computer ScienceComputer Science (R0)