Abstract

The SIP (Session Initiation Protocol) is an application and presentation layer signaling protocol used for initiating, continuing and terminating multimedia session for the end user. It gains much attention of the researchers because it is exposed to several threats and noticed challenging vulnerabilities from time to time. Consequently, the security of SIP is a crucial task and many efforts have been made by different researchers and tried to divert the attention towards its solution. But still, no one claims with conviction about a foolproof secure mechanism for SIP. As users extensively use SIP services, the mutual authentication and key agreement among the participants is an important issue. So, robust authentication and key agreement scheme are mandatory for enhancing security, legitimacy and better complexities. Therefore, we present an improved three-factor authentication scheme that caters all the weakness and known attacks in Mishra et al. scheme. The proposed scheme not only guarantees for security but performance can also be made lightweight. As performance and security contradict each other, the change in one inversely affects the other. The proposed scheme has been analyzed both formally using BAN (Burrows-Abadi-Needham) logic and ProVerif1.93 software verification toolkit, and informally using assumptions which show a delicate balance of security with performance.

Highlights

  • VoIP (Voice over Internet Protocol) is considered to be an alternate of traditional PSTN (Public Switched Telephone Network)

  • We describe how to design an authentication scheme for SIP signaling protocol, because the IP Telephony based on SIP technology has been gaining attention for its innovative approach in providing VoIP service

  • We have described three important asymmetric methods namely RSA, Digital Signature Algorithm (DSA) and Digital Signature Standard (DSS) in detail along with the solution of example for each method

Read more

Summary

INTRODUCTION

VoIP (Voice over Internet Protocol) is considered to be an alternate of traditional PSTN (Public Switched Telephone Network). VoIP is used for transmitting audio, video and multimedia message over IP network. For relaying over IP network, a flexible, reliable and efficient scheme is needed to handle the audio, video and multimedia session. When a new user desires to avail the services of SIP,. SIP Issues and Challenges – A Scalable Three Factor Authentication Scheme SIP MESSAGE. SIP Issues and Challenges – A Scalable Three Factor Authentication Scheme he/she has to enroll first by providing all necessary credentials, overlay algorithm, addresses and stored XML (Extensible Markup Language) file etc. SIP Issues and Challenges – A Scalable Three Factor Authentication Scheme he/she has to enroll first by providing all necessary credentials, overlay algorithm, addresses and stored XML (Extensible Markup Language) file etc. and bootstrap peer network securely transmits data among them

Working Procedure of SIP
Preliminaries and Definitions
Designing Ingredients for SIP
Common Security Flaws in SIP
Cryptographic Primitives for SIP
LITERATURE REVIEW
PROPOSED SOLUTION
Card Revocation Phase
SECURITY ANALYSIS
Informal Analysis
PERFORMANCE ANALYSIS
Communication Cost Analysis
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call