Identity-Based SIP Authentication and Key Agreement
The Session Initiation Protocol (SIP) is designed by taking the establishment of IP telephone network on Internet as the starting point, which has brought new vitality for the IP telephone services. SIP has faced a lot of security threats due to its own characteristics and the application environment. The vulnerability of SIP has been firstly analyzed in this paper. At the same time, based on the theory of identity authentication public key system, a scheme of SIP authentication and key agreement based on identity authentication has been also proposed in this paper. The structure is simple and the application is easy, which has greatly simplified the certificate management and maintenance as well as effectively improved the safety performance of SIP.
KeywordsSIP authentication key agreement IBE
Unable to display preview. Download preview PDF.
- 1.Roseoberg, J., Schulzr, I.H., Camar, I.G.: SIP: Session Initiation Protocol. IETF RFC 3261 (2002)Google Scholar
- 2.Liu, H., Wang, K.: A Study of PKI-based SIP Security Based on PKI. IT Age 2, 37–40 (2005)Google Scholar
- 3.Li, S.-D., Hu, Y., Wang, X.-Q., Yu, Z.: Realization of SIP authentication scheme based on ECC. Computer Applications 27(2), 311–313 (2007)Google Scholar
- 4.Pang, H., An, K., Rong, F.: SIP Authentication Mechanism Using Identity-based Cryptography. China Information Security (5), 133–135 (2007)Google Scholar
- 7.Rosenberg, J., Schulzrinne, H.: SIP: Locating SIP Servers. RFC 3263 (June 2002)Google Scholar
- 8.Wei, Z.M., Feng, J.C.: Study on Security Authentication Mechanism for SIP. Computer Science 35(1), 95–97 (2008)Google Scholar
- 9.El Sawda, S.: SAWDA. SIP Security Attacks and Solutions: A state of the art review (May 2006)Google Scholar