Cryptographically transparent Session Initiation Protocol (SIP) proxies

被引:4
|
作者
Gurbani, Vijay K. [1 ]
Willis, Dean [2 ]
Audet, Francois [3 ]
机构
[1] Bell Labs Alcatel Lucent, Murray Hill, NJ 07974 USA
[2] Cisco Syst, San Jose, CA USA
[3] Nortel Networks, Mississauga, ON, Canada
关键词
communication system privacy; privacy; SIP; TLS; Peer-to-Peer; P2P; P2P-SIP;
D O I
10.1109/ICC.2007.201
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged between two user agents, even if that signaling is performed over a secure channel (e.g., a Transport Layer Security channel.) This paper proposes and evaluates a mechanism that allows the proxies to create an overlay network between the user agents for rendezvous, and once that is done, the proxies become transparent traffic forwarders. From then onwards, user agents can authenticate each other directly and exchange cryptographically secure signaling traffic over the overlay network created by the proxies. This mechanism is applicable to traditional client/server SIP as well as Peer-to-Peer SIP.
引用
收藏
页码:1185 / +
页数:2
相关论文
共 50 条
  • [41] Security Testing of Session Initiation Protocol Implementations
    Harris, Ian G.
    Alrahem, Thoulfekar
    Chen, Alex
    DiGiuseppe, Nick
    Gee, Jefferey
    Hsiao, Shang-Pin
    Mattox, Sean
    Park, Taejoon
    Selvaraj, Saravanan
    Tam, Albert
    Carlsson, Marcel
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 91 - 103
  • [42] A Lightweight Authentication Scheme for Session Initiation Protocol
    Cui Tao
    Gao Qiang
    He Baoliong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 565 - 568
  • [43] Session initiation protocol: Service residency and resiliency
    Gurbani, VK
    Liu, KQ
    BELL LABS TECHNICAL JOURNAL, 2003, 8 (01) : 83 - 94
  • [44] Evaluation of security protocols for the session initiation protocol
    Cha, Eun-Chul
    Choi, Hyoung-Kee
    Cho, Sung-Jae
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 611 - 616
  • [45] SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL
    Geneiatakis, Dimitris
    Dagiuklas, Tasos
    Kambourakis, Georgios
    Lambrinoudakis, Costas
    Gritzalis, Stefanos
    Ehlert, Sven
    Sisalem, Dorgham
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03): : 68 - 81
  • [46] Multiplayer networked gaming with the session initiation protocol
    Singh, A
    Acharya, A
    COMPUTER NETWORKS, 2005, 49 (01) : 38 - 51
  • [47] Secure authentication scheme for session initiation protocol
    Yang, CC
    Wang, RC
    Liu, WT
    COMPUTERS & SECURITY, 2005, 24 (05) : 381 - 386
  • [48] A technique to analyse session initiation protocol traffic
    De Marco, G
    Iacovoni, G
    Barolli, L
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 595 - 599
  • [49] Enhanced authentication protocol for session initiation protocol using smart card
    Zhu, Wenxia
    Chen, Jianhua
    He, Debiao
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (04) : 330 - 342
  • [50] An improved authentication protocol for session initiation protocol using smart card
    Tu, Hang
    Kumar, Neeraj
    Chilamkurti, Naveen
    Rho, Seungmin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (05) : 903 - 910