Abstract
Impersonation attack, based on vulnerable authentication of SIP, facilitates an attacker to take malicious actions such as toll fraud and session hijacking. In this paper, we propose a new lightweight protection mechanism against above actions. As soon as an attacker sends a REGISTER message to SIP registrar, it creates a record called binding in a location server. At this point, our proposing mechanism can detect the attacker by just comparing binding with the REGISTER message received from the attacker. Our protection method can easily enhance user authentication of SIP with little overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Keromytis, A.D.: A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tuctorials 2, 514–537 (2012)
Keromytis, A.D.: A Look at VoIP vulnerabilities. Login 1, 41–50 (2010)
Angelos, D.: Keromytis: Voice over IP Security: Research and Practice. IEEE Security Privacy 2, 76–78 (2010)
Go, Y.-M., Kwon, K.-H.: Countermeasure of SIP Impersonation Attack Using A Location Server. Journal of the Korea Contents Association 4, 17–22 (2013)
Yoon, E.-J., Yoo, K.-Y., Kim, C., Hong, Y.-S., Jo, M., Chen, H.-H.: A Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks. Computer Communications 14, 1674–1681 (2010)
Go, Y.-M., Kwon, K.-H.: Expanding the User Authentication Scheme in SIP. Journal of the Korea Contents Association 12, 88–93 (2013)
Geneiatakis, D., Kambourakis, G., Dagiuklas, T.: SIP Security Mechanisms: A state-of-the-art review. In: Proc. 5th Int. Network Conference, pp. 147–155 (2005)
Rosenberg, Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261, Internet Engineering Task Force (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koh, Y.M., Kwon, K.H. (2014). A New Lightweight Protection Method against Impersonation Attack on SIP. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-41674-3_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41673-6
Online ISBN: 978-3-642-41674-3
eBook Packages: EngineeringEngineering (R0)