SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues

  • D. Chandramohan
  • D. Veeraiah
  • M. Shanmugam
  • N. Balaji
  • G. Sambasivam
  • Shailesh Khapre
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

As the SIP based VoIP system is entirely based on IP network, the vulnerabilities in it affects the VoIP system. This may result in degrading of quality of service in three aspects such as confidentiality, integrity and availability. This paper diagnose the security issues such as registration hijacking, session teardown, message tampering, IP spoofed flooding, disguised proxy and Spam over Internet Telephony (SPIT) and as well as the enhancements to improve the security mechanism to overcome the issues and to provide the quality of service to the legitimate users.

Keywords

Voice over IP (VoIP) Session Initiation Protocol (SIP) User Agent (UA) Real Time Protocol (RTP) Spam over Internet Telephony (SPIT) Transport Layer Security (TLS) Secure Real Time Protocol (SRTP) Introduction (Heading 1) 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shan, L., Jiang, N.: Research on Security Mechanism of SIP basedVoIP System. In: 2009 IEEE Int. Conf. on Hybrid Intelligent Systems, pp. 408–410 (2009)Google Scholar
  2. 2.
    Albers, J., Hahn, B., McGann, S., et al.: An Analysis of Security Threats and Tools in SIP-Based VoIP Systems [EB/OL] (September 2005), www.colorado.edu/policylab/Papers/Univ_Colorado
  3. 3.
    Rosenberg, J., Schulzrinne, H., Camarillo, G., et al.: SIP: session initiation protocol [EB/OL] (June 2002), http://www.ietf.org/rfc/rfc3261.txt; Lucky, R.W.: Automatic equalization for digital communication. Bell Syst. Tech. J. 44(4), 547–588 (1965)
  4. 4.
    Zourzouvillys, T., Rescorla, E.: An Introduction to standards- Based VoIP. IEEE Internet Computing, 69–73 (2010)Google Scholar
  5. 5.
    TLS, SRTP, S/MIME, www.wikipedia.org (referred on January 2, 2011)
  6. 6.
    Salsano, S., Veltri, L., Papalilo, D.: SIP security issues: the SIP authentication procedure and its processing load. IEEE Network 16(6), 38–44 (2002)CrossRefGoogle Scholar
  7. 7.
    Nanda Kishore, M.S., Jayakumar, S.K.V., Satya Reddy, G., Dhavachelvan, P., Chandramohan, D., Soumya Reddy, N.P.: Web service suitability assessment for cloud computing. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) NeCoM 2011, WeST 2011, WiMoN 2011. CCIS, vol. 197, pp. 622–632. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  8. 8.
    Chandramohan, D., Jayakumar, S.K.V., Khapre, S., Nanda Kishore, M.S.: DWSE-Simulator For Distributed Web Service Environment. In: IEEE-International Conference on Recent Trends in Information Technology, ICRTIT-2011, pp. 1203–1208 (2011)Google Scholar
  9. 9.
    Chandramohan, D., Jayakumar, S.K.V., Khapre, S.: DTDWS-Design of TestBed for Distributed Web Service Environment. International Journal of Engineering Science and Technology (IJEST) 3(3), 2399–2404 (2011)Google Scholar
  10. 10.
    Chandramohan, D., Khapre, S., Ashokkumar, S.: A Study of Finding Similarities in Web Service Using Metrics. Selected for Publication in International Journal of Scientific & Engineering Research (IJSER) 2(6) (June 2011) ISSN 2229-5518Google Scholar
  11. 11.
    Khapre, S., Chandramohan, D.: Personalized Web Service Selection. International Journal of Web & Semantic Technology (IJWesT) 2(2), 78–93 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • D. Chandramohan
    • 1
  • D. Veeraiah
    • 2
  • M. Shanmugam
    • 1
  • N. Balaji
    • 1
  • G. Sambasivam
    • 1
  • Shailesh Khapre
    • 1
  1. 1.School of Engineering, Department of Computer Science and EngineeringPondicherry UniversityPondicherryIndia
  2. 2.Department of Computer ScienceVignan UniversityGunturIndia

Personalised recommendations