Implementing a secure VoIP communication over SIP-based networks

被引:0
|
作者
Wen-Bin Hsieh
Jenq-Shiou Leu
机构
[1] National Taiwan University of Science and Technology,Department of Electronic and Computer Engineering
来源
Wireless Networks | 2018年 / 24卷
关键词
Security; VoIP; SIP; ECDH; ECMQV;
D O I
暂无
中图分类号
学科分类号
摘要
Recent years the Session Initiation Protocol (SIP) is commonly used in establishing Voice over IP (VoIP) calls and has become the centerpiece for most VoIP architecture. As wireless and mobile all-IP networks become prosperous, free VoIP applications are utilized in all places. Consequently, the security VoIP is a crucial requirements for its adoption. Many authentication and key agreement schemes are proposed to protect the SIP messages, however, lacking concrete implementations. The performance of VoIP is critical for users’ impressions. In view of this, this paper studies the performance impact of using key agreements, elliptic curve Diffie–Hellman and elliptic curve Menezes–Qu–Vanstone, for making a SIP-based VoIP call. We evaluate the key agreement cost using spongycastle.jce.provider package in Java running on android-based mobile phones, the effect of using different elliptic curves and analyze the security of both key agreements. Furthermore, we design a practical and efficient authentication mechanism to deploy our VoIP architecture and show that a VoIP call can be established in an acceptable interval. As a result, this paper provides a concrete and feasible architecture to secure a VoIP call.
引用
收藏
页码:2915 / 2926
页数:11
相关论文
共 50 条
  • [1] Implementing a secure VoIP communication over SIP-based networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. WIRELESS NETWORKS, 2018, 24 (08) : 2915 - 2926
  • [2] Implementation and Evaluation of SIP-based Secure VoIP Communication System
    Kim, JoongMan
    Yoon, SeokUng
    Jeong, HyunCheol
    Won, YooJae
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 356 - 360
  • [3] Evaluation of SIP-based VOIP in heterogeneous networks
    Khedr, Mohamed
    El Aleem, Onsy Abd
    Selim, Mohamed Mahmoued
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 184 - +
  • [4] A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network
    Yoon, Seokung
    Jung, Hyuncheol
    Lee, Kyung-Seok
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 165 - +
  • [5] SIP-based VoIP Experiment for Disadvantaged Tactical Edge Networks
    Wang, Sherry
    Zheng, Harold
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON TESTBEDS AND RESEARCH INFRASTRUCTURES FOR THE DEVELOPMENT OF NETWORKS & COMMUNITIES, 2009, : 286 - 291
  • [6] An ontology-based policy for deploying secure SIP-based VoIP services
    Geneiatakis, Dimitris
    Lambrinoudakis, Costas
    Kaymbourakis, Georgios
    [J]. COMPUTERS & SECURITY, 2008, 27 (7-8) : 285 - 297
  • [7] The implementation of prepaid services over the SIP-based VoIP network
    Yu, LC
    Chen, TL
    Yang, WZ
    [J]. ITRE 2005: 3rd International Conference on Information Technology: Research and Education, Proceedings, 2005, : 151 - 155
  • [8] A New Security Mechanism for SIP-Based VoIP over WMNs
    Lin, Hui
    Xu, Li
    Gao, Jianliang
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 330 - 333
  • [9] Audio CAPTCHA for SIP-Based VoIP
    Soupionis, Yannis
    Tountas, George
    Gritzalis, Dimitris
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 25 - 38
  • [10] Implementing a SIP-based device communication middleware for OSGi framework with extension to wireless networks
    Chang, Guiran
    Zhu, Chuan
    Ma, Matthew Y.
    Zhu, Weiguo
    Zhu, Jingbo
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 603 - +