Skip to main content

A New Lightweight Protection Method against Impersonation Attack on SIP

  • Conference paper
Advances in Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 279))

Abstract

Impersonation attack, based on vulnerable authentication of SIP, facilitates an attacker to take malicious actions such as toll fraud and session hijacking. In this paper, we propose a new lightweight protection mechanism against above actions. As soon as an attacker sends a REGISTER message to SIP registrar, it creates a record called binding in a location server. At this point, our proposing mechanism can detect the attacker by just comparing binding with the REGISTER message received from the attacker. Our protection method can easily enhance user authentication of SIP with little overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Keromytis, A.D.: A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tuctorials 2, 514–537 (2012)

    Article  MathSciNet  Google Scholar 

  2. Keromytis, A.D.: A Look at VoIP vulnerabilities. Login 1, 41–50 (2010)

    Google Scholar 

  3. Angelos, D.: Keromytis: Voice over IP Security: Research and Practice. IEEE Security Privacy 2, 76–78 (2010)

    Google Scholar 

  4. Go, Y.-M., Kwon, K.-H.: Countermeasure of SIP Impersonation Attack Using A Location Server. Journal of the Korea Contents Association 4, 17–22 (2013)

    Article  Google Scholar 

  5. Yoon, E.-J., Yoo, K.-Y., Kim, C., Hong, Y.-S., Jo, M., Chen, H.-H.: A Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks. Computer Communications 14, 1674–1681 (2010)

    Article  Google Scholar 

  6. Go, Y.-M., Kwon, K.-H.: Expanding the User Authentication Scheme in SIP. Journal of the Korea Contents Association 12, 88–93 (2013)

    Google Scholar 

  7. Geneiatakis, D., Kambourakis, G., Dagiuklas, T.: SIP Security Mechanisms: A state-of-the-art review. In: Proc. 5th Int. Network Conference, pp. 147–155 (2005)

    Google Scholar 

  8. Rosenberg, Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261, Internet Engineering Task Force (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yoon Mi Koh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koh, Y.M., Kwon, K.H. (2014). A New Lightweight Protection Method against Impersonation Attack on SIP. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41674-3_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41673-6

  • Online ISBN: 978-3-642-41674-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics