Cryptographically transparent Session Initiation Protocol (SIP) proxies

被引:4
|
作者
Gurbani, Vijay K. [1 ]
Willis, Dean [2 ]
Audet, Francois [3 ]
机构
[1] Bell Labs Alcatel Lucent, Murray Hill, NJ 07974 USA
[2] Cisco Syst, San Jose, CA USA
[3] Nortel Networks, Mississauga, ON, Canada
关键词
communication system privacy; privacy; SIP; TLS; Peer-to-Peer; P2P; P2P-SIP;
D O I
10.1109/ICC.2007.201
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged between two user agents, even if that signaling is performed over a secure channel (e.g., a Transport Layer Security channel.) This paper proposes and evaluates a mechanism that allows the proxies to create an overlay network between the user agents for rendezvous, and once that is done, the proxies become transparent traffic forwarders. From then onwards, user agents can authenticate each other directly and exchange cryptographically secure signaling traffic over the overlay network created by the proxies. This mechanism is applicable to traditional client/server SIP as well as Peer-to-Peer SIP.
引用
收藏
页码:1185 / +
页数:2
相关论文
共 50 条
  • [1] Benchmarking the Session Initiation Protocol (SIP)
    Zhang, Yueqing
    Clouet, Arthur
    Awotayo, Oluseyi S.
    Davids, Carol
    Gurbani, Vijay K.
    2015 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE ON COMMUNICATIONS QUALITY AND RELIABILITY (CQR), 2015,
  • [2] The session initiation protocol (SIP): An evolutionary study
    Baset, Salman Abdul
    Gurbani, Vijay K.
    Johnston, Alan B.
    Kaplan, Hadriel
    Rosen, Brian
    Rosenberg, Jonathan D.
    Journal of Communications, 2012, 7 (02): : 89 - 105
  • [3] Using SAML to protect the session initiation protocol (SIP)
    Tschofenig, Hannes
    Falk, Rainer
    Peterson, Jon
    Hodges, Jeff
    Sicker, Douglas
    Polk, James
    IEEE NETWORK, 2006, 20 (05): : 14 - 17
  • [5] Characterizing session initiation protocol (SIP) network performance and reliability
    Gurbani, VK
    Jagadeesan, LJ
    Mendiratta, VB
    SERVICE AVAILABILITY, 2005, 3694 : 196 - 211
  • [6] Performance analysis of identity management in the Session Initiation Protocol (SIP)
    Rebahi, Yacine
    Pallares, Jordi Jaen
    Minh, Nguyen Tuan
    Ehlert, Sven
    Kovacs, Gergely
    Sisalem, Dorgharn
    2008 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2008, : 711 - +
  • [7] Colored Petri Net Model of the Session Initiation Protocol (SIP)
    Gehlot, Vijay
    Nigro, Carmen
    IECON 2010 - 36TH ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2010,
  • [8] Multidomain virtual security negotiation over the session initiation protocol (SIP)
    Martinez-Manzano, Daniel J.
    Lopez, Gabriel
    Gomez-Skarmeta, Antonio F.
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 249 - +
  • [9] Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation
    Shen, Charles
    Schulzrinne, Henning
    Nahum, Erich
    PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS: SERVICES AND SECURITY FOR NEXT GENERATION NETWORKS, 2008, 5310 : 149 - +
  • [10] Advanced Quality-of-Service Signaling for the Session Initiation Protocol (SIP)
    Roehricht, Martin
    Bless, Roland
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,