Identity-Based SIP Authentication and Key Agreement

  • Wu ShaoBo
  • Li ChengShu
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 146)


The Session Initiation Protocol (SIP) is designed by taking the establishment of IP telephone network on Internet as the starting point, which has brought new vitality for the IP telephone services. SIP has faced a lot of security threats due to its own characteristics and the application environment. The vulnerability of SIP has been firstly analyzed in this paper. At the same time, based on the theory of identity authentication public key system, a scheme of SIP authentication and key agreement based on identity authentication has been also proposed in this paper. The structure is simple and the application is easy, which has greatly simplified the certificate management and maintenance as well as effectively improved the safety performance of SIP.


SIP authentication key agreement IBE 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Roseoberg, J., Schulzr, I.H., Camar, I.G.: SIP: Session Initiation Protocol. IETF RFC 3261 (2002)Google Scholar
  2. 2.
    Liu, H., Wang, K.: A Study of PKI-based SIP Security Based on PKI. IT Age 2, 37–40 (2005)Google Scholar
  3. 3.
    Li, S.-D., Hu, Y., Wang, X.-Q., Yu, Z.: Realization of SIP authentication scheme based on ECC. Computer Applications 27(2), 311–313 (2007)Google Scholar
  4. 4.
    Pang, H., An, K., Rong, F.: SIP Authentication Mechanism Using Identity-based Cryptography. China Information Security (5), 133–135 (2007)Google Scholar
  5. 5.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  6. 6.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Rosenberg, J., Schulzrinne, H.: SIP: Locating SIP Servers. RFC 3263 (June 2002)Google Scholar
  8. 8.
    Wei, Z.M., Feng, J.C.: Study on Security Authentication Mechanism for SIP. Computer Science 35(1), 95–97 (2008)Google Scholar
  9. 9.
    El Sawda, S.: SAWDA. SIP Security Attacks and Solutions: A state of the art review (May 2006)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Institute of Modern CommunicationBeijing Jiaotong UniversityBeijingChina
  2. 2.Dept. Electronic Information EngineeringBeijing Information Science and Technology UniversityBeijingChina

Personalised recommendations