Implementing a secure VoIP communication over SIP-based networks

被引:0
|
作者
Wen-Bin Hsieh
Jenq-Shiou Leu
机构
[1] National Taiwan University of Science and Technology,Department of Electronic and Computer Engineering
来源
Wireless Networks | 2018年 / 24卷
关键词
Security; VoIP; SIP; ECDH; ECMQV;
D O I
暂无
中图分类号
学科分类号
摘要
Recent years the Session Initiation Protocol (SIP) is commonly used in establishing Voice over IP (VoIP) calls and has become the centerpiece for most VoIP architecture. As wireless and mobile all-IP networks become prosperous, free VoIP applications are utilized in all places. Consequently, the security VoIP is a crucial requirements for its adoption. Many authentication and key agreement schemes are proposed to protect the SIP messages, however, lacking concrete implementations. The performance of VoIP is critical for users’ impressions. In view of this, this paper studies the performance impact of using key agreements, elliptic curve Diffie–Hellman and elliptic curve Menezes–Qu–Vanstone, for making a SIP-based VoIP call. We evaluate the key agreement cost using spongycastle.jce.provider package in Java running on android-based mobile phones, the effect of using different elliptic curves and analyze the security of both key agreements. Furthermore, we design a practical and efficient authentication mechanism to deploy our VoIP architecture and show that a VoIP call can be established in an acceptable interval. As a result, this paper provides a concrete and feasible architecture to secure a VoIP call.
引用
收藏
页码:2915 / 2926
页数:11
相关论文
共 50 条
  • [21] Research on Security Mechanisms of SIP-based VoIP System
    Shan, Liancheng
    Jiang, Ning
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 408 - 410
  • [22] SIP-based VoIP network and its interworking with the PSTN
    Zhang, Y
    [J]. ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 2002, 14 (06): : 273 - 282
  • [23] SIP-based VOIP telephone system design and implementation
    Bai, Xiuxuan
    Zhou, Wenkai
    Ni, Yulin
    [J]. 2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL IV, 2011, : 174 - 177
  • [24] Evaluation of Security and Countermeasures for a SIP-based VoIP Architecture
    Herculea, Marius
    Blaga, Tudor Mihai
    Dobrota, Virgil
    [J]. ROEDUNET 2008 CONFERENCE PROCEEDINGS, 2008, : 34 - 39
  • [25] A Security Model of Voice Eavesdropping Protection over SIP-based VoIP with XTR Cryptography
    Thuayabat, Nikarn
    Tangwongsan, Supachai
    [J]. PROCEEDINGS OF THE 2015 12TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2015, : 207 - 211
  • [26] An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks
    Zhang, Liping
    Tang, Shanyu
    Zhu, Shaohui
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 : 126 - 133
  • [27] VoIP performance in SIP-based vertical handovers between WLAN and GPRS/UMTS networks
    Cardenete-Suriol, Marc
    Mangues-Bafalluy, Josep
    Portoles-Comeras, Marc
    Requena-Esteso, Manuel
    Gorricho, Monica
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1973 - +
  • [28] Challenges in implementing a SIP-Based application server
    Herceg, Sasa
    Weber, Mario
    Macan, Tvrtko
    [J]. CONTEL 2007: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, 2007, : 333 - +
  • [29] Evaluating DoS Attacks Against SIP-Based VoIP Systems
    Rafique, M. Zubair
    Akbar, M. Ali
    Farooq, Muddassar
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6130 - 6135
  • [30] Demonstration of Spam and Security Mechanism in SIP-based VoIP Services
    Choi, Jaesic
    Chae, Kangseok
    Choi, Jaeduck
    Jung, Souhwan
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 52 - 53