Abstract

The Session Initiation Protocol (SIP) is a signaling protocol used for establishing and maintaining communication sessions involving two or more participants. SIP was initially designed for voice over IP and multimedia conferencing, and then was extended to support other services such as instant messaging and presence management. Today, SIP is also adopted to be used with 3G wireless networks, thus it becomes an integral protocol for ubiquitous environment. SIP has various methods that support a variety of applications such as subscribing to a service, notification of an event, status update, and location and presence services. However, when it comes to security, the use of wireless and mobile communication technologies and the pervasive nature of this environment introduce higher risks to security than that of the old simple environment. In this paper, we introduce new architecture that implements a new type of access control called usage access control (UCON) to control the access to the SIP‐based communication at preconnection, during connection, and postconnection. This will enable prescribers of SIP services to control who can identify their locations to approve or disapprove their subsequent connections, and to also set some parameters to determine whether a certain communication can continue or should terminate.

Highlights

  • Nowadays, our society is impacted by a revolutionary innovations in information technology that made communication around the globe seems like it is only a mile away

  • We introduced a new concept of access control for enhancing the security of the Session Initiation Protocol (SIP)-based communications

  • We have integrated this new concept with the SIP protocol to produce new architecture that helps in controlling the access to the SIP-based environment before, during, and after connections

Read more

Summary

INTRODUCTION

Our society is impacted by a revolutionary innovations in information technology that made communication around the globe seems like it is only a mile away. Traditional access controls typically focus on the protection of data in closed environments, and the enforcement of control has been primarily based on identity and attributes of a known user These types of access control lack a comprehensive, systematic approach to fulfill the security requirements of today’s pervasive and ubiquitous nature. To address these issues, we introduce in this paper a new architecture that implements a new type of access control called usage access control (UCON) to control the access to the SIP-based communication at preconnection, during connection, and postconnection.

MOTIVATION
SIP OVERVIEW
SIP applications
SIP security
Subjects
Objects
Rights
Authorization rules
Conditions
Obligations
Areas of control architecture
Application scenarios
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.