A Robust and Efficient SIP Authentication Scheme

  • Alireza Mohammadi-nodooshan
  • Yousef Darmani
  • Rasool Jalili
  • Mehrdad Nourani
Part of the Communications in Computer and Information Science book series (CCIS, volume 6)


Apart from its security, an SIP (Session Initiation Protocol) authentication protocol shall be efficient; because in order to replace traditional telephony, VoIP services have to offer enough security and QoS compared to PSTN services. Recently, Srinivasan et al. proposed an efficient SIP authentication scheme. The low delay overhead introduced by their scheme, causes the total call setup time to be well within the acceptable limit recommended by ITU-T. Based on their work, this paper proposes an SIP authentication scheme. In both schemes, the end users are authenticated with the proxy server in their domain using the registrar server. Comparing with the Srinivasan et al.’s scheme, our proposed scheme is more efficient and secure. Our scheme’s low overhead makes it suitable for applying as an authentication protocol in SIP networks.


Authentication Scheme Session Initiation Protocol Authentication Protocol Proxy Server Computation Overhead 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Salsano, S., Veltri, L., Papalilo, D.: SIP Security Issues: The SIP Authentication Procedure and Its Processing Load. IEEE Network 16(6), 38–44 (2002)CrossRefGoogle Scholar
  2. 2.
    Sun, H.M.: An Efficient Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics 46(4), 958–961 (2000)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Chien, H.Y., Jan, J.K., Tseng, Y.M.: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers & Security 21(4), 372–375 (2002)CrossRefGoogle Scholar
  4. 4.
    Srinivasan, R., et al.: Authentication of Signaling in VoIP Applications. In: 11th Asia-Pacific Conference on Communications (APCC 2005) Proceeding, pp. 530–533 (2005)Google Scholar
  5. 5.
    Menascé, D.: Security Performance. IEEE Internet Computing 7(3), 84–87 (2003)CrossRefGoogle Scholar
  6. 6.
    (August 27, 2007),
  7. 7.
    Sisalem, D., Kuthan, J., Ehlert, S.: Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms. IEEE Network 20(5), 26–31 (2006)CrossRefGoogle Scholar
  8. 8.
    Kwang, K., Choo, R., Boyd, C., Hitchcock, Y.: On Session Key Construction in Provably Secure Protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 116–131. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Rosenberg, J., et al.: SIP: Session Initiation Protocol. IETF RFC 3261( (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Alireza Mohammadi-nodooshan
    • 1
  • Yousef Darmani
    • 1
  • Rasool Jalili
    • 2
  • Mehrdad Nourani
    • 3
  1. 1.Electrical Engineering DepartmentK.N.Tossi University of TechnologyTehranIran
  2. 2.Computer Engineering DepartmentSharif University of TechnologyTehranIran
  3. 3.Electrical Engineering DepartmentThe University of Texas at DallasUSA

Personalised recommendations